ll use data=ordered instead of data journaling mode [ 1582.438541][T14685] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:06:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x48) [ 1582.487006][T14767] FAULT_INJECTION: forcing a failure. [ 1582.487006][T14767] name failslab, interval 1, probability 0, space 0, times 0 [ 1582.500052][T14767] CPU: 1 PID: 14767 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1582.509162][T14767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1582.519212][T14767] Call Trace: [ 1582.522508][T14767] dump_stack+0x172/0x1f0 [ 1582.526840][T14767] should_fail.cold+0xa/0x15 [ 1582.531425][T14767] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1582.537230][T14767] ? ___might_sleep+0x163/0x280 [ 1582.542081][T14767] __should_failslab+0x121/0x190 [ 1582.547011][T14767] should_failslab+0x9/0x14 [ 1582.551511][T14767] __kmalloc+0x2dc/0x740 [ 1582.555747][T14767] ? af_alg_release+0x80/0x80 [ 1582.560418][T14767] ? kasan_check_write+0x14/0x20 [ 1582.565352][T14767] ? sock_kmalloc+0xc6/0x120 [ 1582.569937][T14767] sock_kmalloc+0xc6/0x120 [ 1582.574349][T14767] af_alg_alloc_areq+0x24/0x1e0 [ 1582.579192][T14767] aead_recvmsg+0x45d/0x1ab0 [ 1582.583791][T14767] ? aead_release+0x50/0x50 [ 1582.588290][T14767] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1582.593742][T14767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1582.599993][T14767] ? security_socket_recvmsg+0x9b/0xd0 [ 1582.605446][T14767] ? aead_release+0x50/0x50 [ 1582.609939][T14767] sock_recvmsg+0xd0/0x110 [ 1582.614345][T14767] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1582.620062][T14767] ___sys_recvmsg+0x273/0x5d0 [ 1582.624736][T14767] ? ___sys_sendmsg+0x930/0x930 [ 1582.629580][T14767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1582.635814][T14767] ? kasan_check_read+0x11/0x20 [ 1582.640663][T14767] ? __fget+0x381/0x550 [ 1582.644813][T14767] ? ksys_dup3+0x3e0/0x3e0 [ 1582.649217][T14767] ? lock_downgrade+0x880/0x880 [ 1582.654070][T14767] ? __fget_light+0x1a9/0x230 [ 1582.658741][T14767] ? __fdget+0x1b/0x20 [ 1582.662803][T14767] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1582.669037][T14767] __sys_recvmsg+0x102/0x1d0 [ 1582.673621][T14767] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1582.678911][T14767] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1582.684359][T14767] ? do_syscall_64+0x26/0x610 [ 1582.689026][T14767] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1582.695085][T14767] ? do_syscall_64+0x26/0x610 [ 1582.699756][T14767] __x64_sys_recvmsg+0x78/0xb0 [ 1582.704515][T14767] do_syscall_64+0x103/0x610 [ 1582.709098][T14767] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1582.714975][T14767] RIP: 0033:0x457e29 [ 1582.718874][T14767] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1582.738553][T14767] RSP: 002b:00007f6a88447c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1582.746954][T14767] RAX: ffffffffffffffda RBX: 00007f6a88447c90 RCX: 0000000000457e29 [ 1582.754918][T14767] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 [ 1582.762975][T14767] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1582.770946][T14767] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a884486d4 [ 1582.778904][T14767] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 22:06:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:06:45 executing program 0 (fault-call:8 fault-nth:25): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) [ 1582.787107][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1582.792918][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:06:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x48) 22:06:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x48) 22:06:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000100)=""/23, 0x17}, {&(0x7f00000023c0)=""/4096, 0x1000}], 0x2}, 0x0) [ 1582.997814][T14778] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1583.021811][T14778] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:06:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x48) [ 1583.100707][T14778] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1583.111875][T14778] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1583.159176][T14789] FAULT_INJECTION: forcing a failure. [ 1583.159176][T14789] name failslab, interval 1, probability 0, space 0, times 0 [ 1583.178340][T14789] CPU: 0 PID: 14789 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1583.187469][T14789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1583.197518][T14789] Call Trace: [ 1583.200826][T14789] dump_stack+0x172/0x1f0 [ 1583.205166][T14789] should_fail.cold+0xa/0x15 [ 1583.209766][T14789] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1583.215581][T14789] ? ___might_sleep+0x163/0x280 [ 1583.220451][T14789] __should_failslab+0x121/0x190 [ 1583.225382][T14789] should_failslab+0x9/0x14 [ 1583.229869][T14789] __kmalloc+0x2dc/0x740 [ 1583.234091][T14789] ? af_alg_release+0x80/0x80 [ 1583.238747][T14789] ? kasan_check_write+0x14/0x20 [ 1583.243660][T14789] ? sock_kmalloc+0xc6/0x120 [ 1583.248574][T14789] sock_kmalloc+0xc6/0x120 [ 1583.252968][T14789] af_alg_alloc_areq+0x24/0x1e0 [ 1583.257794][T14789] aead_recvmsg+0x45d/0x1ab0 [ 1583.262383][T14789] ? aead_release+0x50/0x50 [ 1583.266886][T14789] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1583.272321][T14789] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1583.278537][T14789] ? security_socket_recvmsg+0x9b/0xd0 [ 1583.283973][T14789] ? aead_release+0x50/0x50 [ 1583.288454][T14789] sock_recvmsg+0xd0/0x110 [ 1583.292863][T14789] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1583.298581][T14789] ___sys_recvmsg+0x273/0x5d0 [ 1583.303239][T14789] ? ___sys_sendmsg+0x930/0x930 [ 1583.308068][T14789] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1583.314285][T14789] ? kasan_check_read+0x11/0x20 [ 1583.319116][T14789] ? __fget+0x381/0x550 [ 1583.323252][T14789] ? ksys_dup3+0x3e0/0x3e0 [ 1583.327642][T14789] ? lock_downgrade+0x880/0x880 [ 1583.332473][T14789] ? __fget_light+0x1a9/0x230 [ 1583.337128][T14789] ? __fdget+0x1b/0x20 [ 1583.341174][T14789] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1583.347392][T14789] __sys_recvmsg+0x102/0x1d0 [ 1583.351963][T14789] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1583.357233][T14789] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1583.362667][T14789] ? do_syscall_64+0x26/0x610 [ 1583.367322][T14789] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1583.373360][T14789] ? do_syscall_64+0x26/0x610 [ 1583.378014][T14789] __x64_sys_recvmsg+0x78/0xb0 [ 1583.382753][T14789] do_syscall_64+0x103/0x610 [ 1583.387326][T14789] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1583.393205][T14789] RIP: 0033:0x457e29 [ 1583.397079][T14789] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1583.416653][T14789] RSP: 002b:00007f6a88447c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1583.425037][T14789] RAX: ffffffffffffffda RBX: 00007f6a88447c90 RCX: 0000000000457e29 [ 1583.432981][T14789] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 [ 1583.440927][T14789] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1583.448871][T14789] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a884486d4 22:06:45 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1d6, 0x0) 22:06:45 executing program 2: socketpair$unix(0x1, 0x1000000007, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="a5a84646922020931f3e8da1f0f825f9a7153527d97240e5bced48d651c4b3f13af83af46f4150a237193599f20b21c24b61ac0b3874efe7b48c736219ada604d3f132fb0cf29319d2f6ac092d4aaabbc82b799ae2fb0e18c319aa878942b304401ef81e495c448695eeaa348a4f63a04399e59cccdb48dd16a07047dfbca8bddb322343468bb77725e9c968b40895fe77390acceca1a6a95bf32c399d43d59eff3c7a576c86b6d42ae1a5978e10028b83e8dff098f61f0346d17506797cf40c16ddbc8e2dab82a7b9", 0xc9, 0xfffffffffffffffb) keyctl$set_timeout(0xf, r2, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) ioctl$FIONREAD(r1, 0x541b, &(0x7f00000002c0)) connect$unix(r3, &(0x7f0000000480)=@file={0x0, './file0\x00'}, 0x6e) syz_open_pts(r1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) r4 = syz_open_dev$audion(&(0x7f0000000300)='/dev/audio#\x00', 0x81, 0x40000) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x0}, {}]}) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000) ioctl$DRM_IOCTL_RM_CTX(r4, 0xc0086421, &(0x7f0000000540)={r5, 0xffffffffffffffff}) r6 = fcntl$getown(r0, 0x9) migrate_pages(r6, 0xfffffffffffffff9, &(0x7f0000000400)=0x6, &(0x7f0000000440)=0xc034) 22:06:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:06:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}, 0x48) [ 1583.456829][T14789] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 22:06:45 executing program 0 (fault-call:8 fault-nth:26): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) [ 1583.641900][T14913] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1583.679618][T14913] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:06:46 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x440, 0x0) ioctl$SIOCX25SCALLUSERDATA(r0, 0x89e5, &(0x7f0000000640)={0x26, "625c77e29539c0f38daa39ab25e26dc0dd8c311dbc8c812bd94bc3d9dbb2074ed7a524bf85744e511b05abc80f784daa415a890f4015a23e059a10fa497954feaf21995b8564b3c12e8a8ac25932ff161c4811c696fc75ae5988dbe72e2df7f6a771689cafc4e5e8e87efdbe584b2527a65caac04048c87837a99aca5c36baa8"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000580)={r1, &(0x7f0000000400)="f919b565c97d9e1885c4dd67a5356b3bb3fd3a0951fb84cace6c8cac392c71c6f162cbc331f924d95df3e4e3b6767a63ae381dd4b7e68805564ca7a5f8277caa19701379e0e4e64119796624a5ee5f55f0fd3f98e0e5e9abfc920908c6bc4542cbcd3cee0cd01b84370e74b27226610eae38ca974fab1e590cb0807fe1a6eca95ff4bf228005d12b9797dca14bd25f159d", &(0x7f00000004c0)=""/129}, 0x18) r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x100, 0x800) write$sndseq(r2, &(0x7f00000002c0)=[{0x14, 0x1, 0x7fffffff, 0x6d0be9f1, @tick=0x8e, {0x76, 0xff03}, {0x60000, 0xfffffffffffff000}, @quote={{0x200, 0x33}, 0x7}}, {0x10000, 0x3, 0x10001, 0x1000, @time={0x77359400}, {0x100000000, 0x9}, {0xfffffffffffffffb, 0x9}, @control={0x10001, 0x81, 0x800}}, {0x780000000000000, 0x1, 0x7, 0x3, @time, {0x7, 0x434d92ca}, {0xffffffff, 0x2}, @ext={0x7d, &(0x7f00000001c0)="fe62787839d605d34c8b2ca1b7aaa4732fdb14b7b778be53882edc61ae2d43e28549f5a84336bf92f7a3452f06f0343c93954d13b92d4f7d4bb05ecb542af73f83243ef2e5aace77530dc595e1c9163a6b39f22326bde19892c9a5d3b7c8f31a4371e4f2319ea523d6e77d9bc7ed88d942f858ee5b1839736c06a8cbdc"}}, {0x6, 0x9, 0x81, 0x7, @tick=0x9, {0x4, 0x1ff}, {0x8, 0x100000001}, @note={0x8, 0x1, 0xffffffff, 0x1, 0xfffffffffffffffa}}, {0x5, 0x5, 0xfff, 0x4b1, @tick=0x7c, {0x164, 0x8}, {0xb6e, 0x4}, @quote={{0x80000000, 0x200}, 0x80, &(0x7f0000000240)={0x1c2e, 0x1, 0x7, 0x0, @time={0x0, 0x989680}, {0x2, 0x8001}, {0x31, 0x3f}, @control={0x8, 0x1ff, 0x1}}}}, {0x6a93, 0x381e, 0x5642, 0x83, @time, {0x42, 0x1}, {0x80000000000000, 0x6}, @quote={{0x401, 0x10001}, 0x80, &(0x7f0000000280)={0x1, 0x8001, 0x9, 0x9, @tick=0x99, {0xffffffffffffffc0, 0x8001}, {0x3, 0x6}, @addr={0x7fffffff, 0x327f00}}}}], 0x120) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000600)='/dev/audio\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r4, 0x401054d6, 0x0) syz_open_pts(r3, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r4, 0x400443c9, &(0x7f0000000040)={{0x5, 0x6, 0x1, 0x80, 0x7, 0x48000}, 0x1}) 22:06:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x48) [ 1583.710654][T14919] FAULT_INJECTION: forcing a failure. [ 1583.710654][T14919] name failslab, interval 1, probability 0, space 0, times 0 [ 1583.725257][T14919] CPU: 1 PID: 14919 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1583.734379][T14919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1583.744436][T14919] Call Trace: [ 1583.747722][T14919] dump_stack+0x172/0x1f0 [ 1583.752053][T14919] should_fail.cold+0xa/0x15 [ 1583.756638][T14919] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1583.762443][T14919] ? ___might_sleep+0x163/0x280 [ 1583.767289][T14919] __should_failslab+0x121/0x190 [ 1583.772219][T14919] should_failslab+0x9/0x14 [ 1583.776712][T14919] __kmalloc+0x2dc/0x740 [ 1583.780948][T14919] ? af_alg_release+0x80/0x80 [ 1583.785614][T14919] ? kasan_check_write+0x14/0x20 [ 1583.790544][T14919] ? sock_kmalloc+0xc6/0x120 [ 1583.795129][T14919] sock_kmalloc+0xc6/0x120 [ 1583.799543][T14919] af_alg_alloc_areq+0x24/0x1e0 [ 1583.804392][T14919] aead_recvmsg+0x45d/0x1ab0 [ 1583.808989][T14919] ? aead_release+0x50/0x50 [ 1583.813482][T14919] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1583.818934][T14919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1583.825171][T14919] ? security_socket_recvmsg+0x9b/0xd0 [ 1583.830623][T14919] ? aead_release+0x50/0x50 [ 1583.835138][T14919] sock_recvmsg+0xd0/0x110 [ 1583.839549][T14919] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1583.845261][T14919] ___sys_recvmsg+0x273/0x5d0 [ 1583.850022][T14919] ? ___sys_sendmsg+0x930/0x930 [ 1583.854873][T14919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1583.861113][T14919] ? kasan_check_read+0x11/0x20 [ 1583.865967][T14919] ? __fget+0x381/0x550 [ 1583.870117][T14919] ? ksys_dup3+0x3e0/0x3e0 [ 1583.874541][T14919] ? lock_downgrade+0x880/0x880 [ 1583.879408][T14919] ? __fget_light+0x1a9/0x230 [ 1583.884076][T14919] ? __fdget+0x1b/0x20 [ 1583.888143][T14919] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1583.894376][T14919] __sys_recvmsg+0x102/0x1d0 [ 1583.898964][T14919] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1583.904249][T14919] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1583.909698][T14919] ? do_syscall_64+0x26/0x610 [ 1583.914362][T14919] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1583.920422][T14919] ? do_syscall_64+0x26/0x610 [ 1583.925095][T14919] __x64_sys_recvmsg+0x78/0xb0 [ 1583.929849][T14919] do_syscall_64+0x103/0x610 [ 1583.934431][T14919] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1583.940313][T14919] RIP: 0033:0x457e29 [ 1583.944205][T14919] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1583.963799][T14919] RSP: 002b:00007f6a88447c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1583.972197][T14919] RAX: ffffffffffffffda RBX: 00007f6a88447c90 RCX: 0000000000457e29 [ 1583.980157][T14919] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 [ 1583.988116][T14919] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1583.996080][T14919] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a884486d4 [ 1584.004040][T14919] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 22:06:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000100)=""/23, 0x17}, {&(0x7f00000023c0)=""/4096, 0x1000}], 0x2}, 0x0) [ 1584.054585][T14913] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1584.099670][T14913] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:06:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000100)=""/23, 0x17}, {&(0x7f00000023c0)=""/4096, 0x1000}], 0x2}, 0x0) 22:06:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1810000000000000]}, 0x48) 22:06:46 executing program 0 (fault-call:8 fault-nth:27): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:06:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) [ 1584.341563][T14945] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1584.352456][T14945] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1584.370817][T14949] FAULT_INJECTION: forcing a failure. [ 1584.370817][T14949] name failslab, interval 1, probability 0, space 0, times 0 [ 1584.387250][T14949] CPU: 1 PID: 14949 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1584.396371][T14949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1584.406419][T14949] Call Trace: [ 1584.409716][T14949] dump_stack+0x172/0x1f0 [ 1584.414057][T14949] should_fail.cold+0xa/0x15 [ 1584.418656][T14949] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1584.424466][T14949] ? ___might_sleep+0x163/0x280 [ 1584.429321][T14949] __should_failslab+0x121/0x190 [ 1584.434265][T14949] should_failslab+0x9/0x14 22:06:46 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1d7, 0x0) 22:06:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000100)=""/23, 0x17}, {&(0x7f00000023c0)=""/4096, 0x1000}], 0x2}, 0x0) 22:06:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2002000000000000]}, 0x48) 22:06:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) [ 1584.438764][T14949] __kmalloc+0x2dc/0x740 [ 1584.443008][T14949] ? af_alg_release+0x80/0x80 [ 1584.447689][T14949] ? kasan_check_write+0x14/0x20 [ 1584.452634][T14949] ? sock_kmalloc+0xc6/0x120 [ 1584.457233][T14949] sock_kmalloc+0xc6/0x120 [ 1584.461658][T14949] af_alg_alloc_areq+0x24/0x1e0 [ 1584.466507][T14949] aead_recvmsg+0x45d/0x1ab0 [ 1584.471107][T14949] ? aead_release+0x50/0x50 [ 1584.475600][T14949] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1584.481052][T14949] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1584.487287][T14949] ? security_socket_recvmsg+0x9b/0xd0 [ 1584.492735][T14949] ? aead_release+0x50/0x50 [ 1584.497234][T14949] sock_recvmsg+0xd0/0x110 [ 1584.501639][T14949] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1584.507359][T14949] ___sys_recvmsg+0x273/0x5d0 [ 1584.512036][T14949] ? ___sys_sendmsg+0x930/0x930 [ 1584.516878][T14949] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1584.523115][T14949] ? kasan_check_read+0x11/0x20 [ 1584.527960][T14949] ? __fget+0x381/0x550 [ 1584.532119][T14949] ? ksys_dup3+0x3e0/0x3e0 [ 1584.536526][T14949] ? lock_downgrade+0x880/0x880 [ 1584.541379][T14949] ? __fget_light+0x1a9/0x230 [ 1584.546054][T14949] ? __fdget+0x1b/0x20 [ 1584.550121][T14949] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1584.556359][T14949] __sys_recvmsg+0x102/0x1d0 [ 1584.560947][T14949] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1584.566245][T14949] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1584.571694][T14949] ? do_syscall_64+0x26/0x610 [ 1584.576367][T14949] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1584.582426][T14949] ? do_syscall_64+0x26/0x610 [ 1584.587581][T14949] __x64_sys_recvmsg+0x78/0xb0 [ 1584.592346][T14949] do_syscall_64+0x103/0x610 [ 1584.596930][T14949] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1584.602813][T14949] RIP: 0033:0x457e29 [ 1584.606704][T14949] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1584.626295][T14949] RSP: 002b:00007f6a88447c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1584.634700][T14949] RAX: ffffffffffffffda RBX: 00007f6a88447c90 RCX: 0000000000457e29 [ 1584.642658][T14949] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 [ 1584.650621][T14949] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1584.658584][T14949] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a884486d4 [ 1584.666547][T14949] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 22:06:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, 0x0, 0x0) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000100)=""/23, 0x17}, {&(0x7f00000023c0)=""/4096, 0x1000}], 0x2}, 0x0) [ 1584.733663][T15058] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1584.746602][T15058] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1584.860282][T15058] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1584.874712][T15058] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:06:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000280)={0x0, 0x5}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000300)=@assoc_value={r3, 0x7}, 0x8) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) syz_open_pts(r1, 0x0) syz_open_dev$rtc(&(0x7f0000000340)='/dev/rtc#\x00', 0x1, 0x400000) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000180)=""/162, &(0x7f0000000040)=0xa2) 22:06:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x48) 22:06:47 executing program 0 (fault-call:8 fault-nth:28): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:06:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, 0x0, 0x0) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000100)=""/23, 0x17}, {&(0x7f00000023c0)=""/4096, 0x1000}], 0x2}, 0x0) 22:06:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:06:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, 0x0, 0x0) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000100)=""/23, 0x17}, {&(0x7f00000023c0)=""/4096, 0x1000}], 0x2}, 0x0) 22:06:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}, 0x48) [ 1585.033377][T15082] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1585.050847][T15082] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1585.068574][T15085] FAULT_INJECTION: forcing a failure. [ 1585.068574][T15085] name failslab, interval 1, probability 0, space 0, times 0 [ 1585.118964][T15085] CPU: 0 PID: 15085 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1585.128082][T15085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1585.138132][T15085] Call Trace: [ 1585.141426][T15085] dump_stack+0x172/0x1f0 [ 1585.145771][T15085] should_fail.cold+0xa/0x15 [ 1585.150385][T15085] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1585.156201][T15085] ? ___might_sleep+0x163/0x280 [ 1585.161061][T15085] __should_failslab+0x121/0x190 [ 1585.166001][T15085] should_failslab+0x9/0x14 [ 1585.170507][T15085] __kmalloc+0x2dc/0x740 [ 1585.174759][T15085] ? af_alg_release+0x80/0x80 [ 1585.179437][T15085] ? kasan_check_write+0x14/0x20 [ 1585.184377][T15085] ? sock_kmalloc+0xc6/0x120 [ 1585.188968][T15085] sock_kmalloc+0xc6/0x120 [ 1585.193392][T15085] af_alg_alloc_areq+0x24/0x1e0 [ 1585.198232][T15085] aead_recvmsg+0x45d/0x1ab0 [ 1585.202845][T15085] ? aead_release+0x50/0x50 [ 1585.207334][T15085] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1585.212780][T15085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1585.219025][T15085] ? security_socket_recvmsg+0x9b/0xd0 [ 1585.224478][T15085] ? aead_release+0x50/0x50 [ 1585.228990][T15085] sock_recvmsg+0xd0/0x110 [ 1585.233412][T15085] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1585.239116][T15085] ___sys_recvmsg+0x273/0x5d0 [ 1585.243784][T15085] ? ___sys_sendmsg+0x930/0x930 [ 1585.248626][T15085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1585.254875][T15085] ? kasan_check_read+0x11/0x20 [ 1585.259708][T15085] ? __fget+0x381/0x550 [ 1585.263863][T15085] ? ksys_dup3+0x3e0/0x3e0 [ 1585.268272][T15085] ? lock_downgrade+0x880/0x880 [ 1585.273120][T15085] ? __fget_light+0x1a9/0x230 [ 1585.277785][T15085] ? __fdget+0x1b/0x20 [ 1585.281829][T15085] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1585.288049][T15085] __sys_recvmsg+0x102/0x1d0 [ 1585.292629][T15085] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1585.297909][T15085] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1585.303355][T15085] ? do_syscall_64+0x26/0x610 [ 1585.308029][T15085] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1585.314092][T15085] ? do_syscall_64+0x26/0x610 [ 1585.318773][T15085] __x64_sys_recvmsg+0x78/0xb0 [ 1585.323544][T15085] do_syscall_64+0x103/0x610 [ 1585.328134][T15085] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1585.334012][T15085] RIP: 0033:0x457e29 [ 1585.337892][T15085] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1585.357472][T15085] RSP: 002b:00007f6a88447c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1585.365858][T15085] RAX: ffffffffffffffda RBX: 00007f6a88447c90 RCX: 0000000000457e29 [ 1585.373817][T15085] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 [ 1585.381775][T15085] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1585.389725][T15085] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a884486d4 [ 1585.397687][T15085] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 [ 1585.467829][T15082] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1585.489775][T15082] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:06:48 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1d8, 0x0) 22:06:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000100)=""/23, 0x17}, {&(0x7f00000023c0)=""/4096, 0x1000}], 0x2}, 0x0) 22:06:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000]}, 0x48) 22:06:48 executing program 0 (fault-call:8 fault-nth:29): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:06:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) [ 1585.605586][T15208] FAULT_INJECTION: forcing a failure. [ 1585.605586][T15208] name failslab, interval 1, probability 0, space 0, times 0 [ 1585.661786][T15215] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1585.675133][T15215] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1585.712621][T15208] CPU: 0 PID: 15208 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1585.721737][T15208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1585.731772][T15208] Call Trace: [ 1585.735047][T15208] dump_stack+0x172/0x1f0 [ 1585.739359][T15208] should_fail.cold+0xa/0x15 [ 1585.743930][T15208] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1585.749718][T15208] ? ___might_sleep+0x163/0x280 [ 1585.754550][T15208] __should_failslab+0x121/0x190 [ 1585.759469][T15208] should_failslab+0x9/0x14 [ 1585.763961][T15208] __kmalloc+0x2dc/0x740 [ 1585.768195][T15208] ? af_alg_release+0x80/0x80 [ 1585.772857][T15208] ? kasan_check_write+0x14/0x20 [ 1585.777790][T15208] ? sock_kmalloc+0xc6/0x120 [ 1585.782364][T15208] sock_kmalloc+0xc6/0x120 [ 1585.786759][T15208] af_alg_alloc_areq+0x24/0x1e0 [ 1585.791604][T15208] aead_recvmsg+0x45d/0x1ab0 [ 1585.796192][T15208] ? aead_release+0x50/0x50 [ 1585.800687][T15208] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1585.806126][T15208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1585.812345][T15208] ? security_socket_recvmsg+0x9b/0xd0 [ 1585.817777][T15208] ? aead_release+0x50/0x50 [ 1585.822260][T15208] sock_recvmsg+0xd0/0x110 [ 1585.826654][T15208] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1585.832440][T15208] ___sys_recvmsg+0x273/0x5d0 [ 1585.837111][T15208] ? ___sys_sendmsg+0x930/0x930 [ 1585.841980][T15208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1585.848240][T15208] ? kasan_check_read+0x11/0x20 [ 1585.853097][T15208] ? __fget+0x381/0x550 [ 1585.857253][T15208] ? ksys_dup3+0x3e0/0x3e0 [ 1585.861645][T15208] ? lock_downgrade+0x880/0x880 [ 1585.866497][T15208] ? __fget_light+0x1a9/0x230 [ 1585.871152][T15208] ? __fdget+0x1b/0x20 [ 1585.875212][T15208] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1585.881458][T15208] __sys_recvmsg+0x102/0x1d0 [ 1585.886034][T15208] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1585.891308][T15208] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1585.896753][T15208] ? do_syscall_64+0x26/0x610 [ 1585.901423][T15208] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1585.907483][T15208] ? do_syscall_64+0x26/0x610 [ 1585.912144][T15208] __x64_sys_recvmsg+0x78/0xb0 [ 1585.916889][T15208] do_syscall_64+0x103/0x610 [ 1585.921459][T15208] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1585.927415][T15208] RIP: 0033:0x457e29 [ 1585.931291][T15208] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1585.950873][T15208] RSP: 002b:00007f6a88447c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f 22:06:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) syz_open_pts(r0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xffff, 0x0) ioctl$VIDIOC_ENUMAUDIO(r1, 0xc0345641, &(0x7f0000000180)={0x4, "b35c5e0f024c71316551a711928d165e3bfd3a7365be6aeabf0aaf28fdaaf419", 0x1, 0x1}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) 22:06:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000]}, 0x48) [ 1585.959261][T15208] RAX: ffffffffffffffda RBX: 00007f6a88447c90 RCX: 0000000000457e29 [ 1585.967216][T15208] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 [ 1585.975166][T15208] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1585.983114][T15208] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a884486d4 [ 1585.991061][T15208] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 22:06:48 executing program 0 (fault-call:8 fault-nth:30): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:06:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000]}, 0x48) [ 1586.052325][T15215] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1586.081448][T15215] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:06:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000]}, 0x48) 22:06:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) [ 1586.203116][ C1] print_req_error: 478 callbacks suppressed [ 1586.203128][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1586.216255][ C1] buffer_io_error: 478 callbacks suppressed [ 1586.216265][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1586.231389][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1586.238773][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1586.246928][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1586.254121][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1586.259973][T15239] FAULT_INJECTION: forcing a failure. [ 1586.259973][T15239] name failslab, interval 1, probability 0, space 0, times 0 [ 1586.265207][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1586.281755][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1586.282959][T15239] CPU: 0 PID: 15239 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1586.290491][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1586.298648][T15239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1586.298655][T15239] Call Trace: [ 1586.298675][T15239] dump_stack+0x172/0x1f0 [ 1586.298696][T15239] should_fail.cold+0xa/0x15 [ 1586.298718][T15239] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1586.305820][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1586.315841][T15239] ? ___might_sleep+0x163/0x280 [ 1586.315860][T15239] __should_failslab+0x121/0x190 [ 1586.315879][T15239] should_failslab+0x9/0x14 [ 1586.319716][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1586.323456][T15239] __kmalloc+0x2dc/0x740 [ 1586.323475][T15239] ? af_alg_release+0x80/0x80 [ 1586.323490][T15239] ? kasan_check_write+0x14/0x20 [ 1586.323509][T15239] ? sock_kmalloc+0xc6/0x120 [ 1586.328073][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1586.333860][T15239] sock_kmalloc+0xc6/0x120 [ 1586.333879][T15239] af_alg_alloc_areq+0x24/0x1e0 [ 1586.333897][T15239] aead_recvmsg+0x45d/0x1ab0 [ 1586.345216][ C1] net_ratelimit: 16 callbacks suppressed [ 1586.345224][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1586.346521][T15239] ? aead_release+0x50/0x50 [ 1586.346536][T15239] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1586.346555][T15239] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1586.351493][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1586.355947][T15239] ? security_socket_recvmsg+0x9b/0xd0 [ 1586.355962][T15239] ? aead_release+0x50/0x50 [ 1586.355980][T15239] sock_recvmsg+0xd0/0x110 [ 1586.355997][T15239] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1586.363151][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1586.367300][T15239] ___sys_recvmsg+0x273/0x5d0 [ 1586.371966][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1586.376862][T15239] ? ___sys_sendmsg+0x930/0x930 [ 1586.376874][T15239] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1586.376894][T15239] ? kasan_check_read+0x11/0x20 [ 1586.381510][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1586.389231][T15239] ? __fget+0x381/0x550 [ 1586.389252][T15239] ? ksys_dup3+0x3e0/0x3e0 [ 1586.393661][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1586.398469][T15239] ? lock_downgrade+0x880/0x880 [ 1586.403727][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1586.408641][T15239] ? __fget_light+0x1a9/0x230 [ 1586.408659][T15239] ? __fdget+0x1b/0x20 [ 1586.408678][T15239] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1586.414391][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1586.418853][T15239] __sys_recvmsg+0x102/0x1d0 [ 1586.424728][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1586.430505][T15239] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1586.430534][T15239] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1586.430547][T15239] ? do_syscall_64+0x26/0x610 [ 1586.430567][T15239] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1586.436275][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1586.441691][T15239] ? do_syscall_64+0x26/0x610 [ 1586.446691][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1586.450571][T15239] __x64_sys_recvmsg+0x78/0xb0 [ 1586.450589][T15239] do_syscall_64+0x103/0x610 [ 1586.450608][T15239] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1586.450623][T15239] RIP: 0033:0x457e29 [ 1586.456334][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1586.462011][T15239] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1586.645274][T15239] RSP: 002b:00007f6a88447c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1586.653666][T15239] RAX: ffffffffffffffda RBX: 00007f6a88447c90 RCX: 0000000000457e29 [ 1586.661612][T15239] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 [ 1586.669558][T15239] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1586.677508][T15239] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a884486d4 [ 1586.685464][T15239] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 [ 1586.699107][ C0] protocol 88fb is buggy, dev hsr_slave_0 22:06:49 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1d9, 0x0) 22:06:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000]}, 0x48) [ 1586.705021][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:06:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000100)=""/23, 0x17}, {&(0x7f00000023c0)=""/4096, 0x1000}], 0x2}, 0x0) 22:06:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000]}, 0x48) 22:06:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8500000000000000]}, 0x48) [ 1586.844281][T15359] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1586.868603][T15359] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:06:49 executing program 0 (fault-call:8 fault-nth:31): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:06:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) r2 = syz_open_pts(r1, 0x0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000240)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) write$FUSE_BMAP(r1, &(0x7f0000000180)={0x18, 0x0, 0x1, {0x10000}}, 0x18) [ 1586.902698][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1586.902712][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1586.908527][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1586.920343][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1586.961278][T15359] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1586.988930][T15359] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:06:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:06:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff00000000]}, 0x48) [ 1587.081803][T15378] FAULT_INJECTION: forcing a failure. [ 1587.081803][T15378] name failslab, interval 1, probability 0, space 0, times 0 [ 1587.096621][T15378] CPU: 1 PID: 15378 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1587.105740][T15378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1587.115784][T15378] Call Trace: [ 1587.119071][T15378] dump_stack+0x172/0x1f0 [ 1587.123401][T15378] should_fail.cold+0xa/0x15 [ 1587.127990][T15378] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1587.133796][T15378] ? ___might_sleep+0x163/0x280 [ 1587.138643][T15378] __should_failslab+0x121/0x190 [ 1587.143574][T15378] should_failslab+0x9/0x14 [ 1587.148070][T15378] __kmalloc+0x2dc/0x740 [ 1587.152306][T15378] ? af_alg_release+0x80/0x80 [ 1587.156972][T15378] ? kasan_check_write+0x14/0x20 [ 1587.161902][T15378] ? sock_kmalloc+0xc6/0x120 [ 1587.166485][T15378] sock_kmalloc+0xc6/0x120 [ 1587.170901][T15378] af_alg_alloc_areq+0x24/0x1e0 [ 1587.175747][T15378] aead_recvmsg+0x45d/0x1ab0 [ 1587.180344][T15378] ? aead_release+0x50/0x50 [ 1587.184843][T15378] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1587.190300][T15378] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1587.196538][T15378] ? security_socket_recvmsg+0x9b/0xd0 [ 1587.201989][T15378] ? aead_release+0x50/0x50 [ 1587.206493][T15378] sock_recvmsg+0xd0/0x110 [ 1587.210901][T15378] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1587.216615][T15378] ___sys_recvmsg+0x273/0x5d0 [ 1587.221290][T15378] ? ___sys_sendmsg+0x930/0x930 [ 1587.226140][T15378] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1587.232373][T15378] ? kasan_check_read+0x11/0x20 [ 1587.237226][T15378] ? __fget+0x381/0x550 [ 1587.241380][T15378] ? ksys_dup3+0x3e0/0x3e0 [ 1587.245784][T15378] ? lock_downgrade+0x880/0x880 [ 1587.250631][T15378] ? __fget_light+0x1a9/0x230 [ 1587.255304][T15378] ? __fdget+0x1b/0x20 [ 1587.259363][T15378] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1587.265596][T15378] __sys_recvmsg+0x102/0x1d0 [ 1587.270177][T15378] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1587.275463][T15378] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1587.280913][T15378] ? do_syscall_64+0x26/0x610 [ 1587.285584][T15378] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1587.291639][T15378] ? do_syscall_64+0x26/0x610 [ 1587.296315][T15378] __x64_sys_recvmsg+0x78/0xb0 [ 1587.301070][T15378] do_syscall_64+0x103/0x610 [ 1587.305660][T15378] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1587.311541][T15378] RIP: 0033:0x457e29 [ 1587.315428][T15378] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1587.335025][T15378] RSP: 002b:00007f6a88447c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1587.343426][T15378] RAX: ffffffffffffffda RBX: 00007f6a88447c90 RCX: 0000000000457e29 [ 1587.351387][T15378] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 [ 1587.359349][T15378] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1587.367449][T15378] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a884486d4 [ 1587.375413][T15378] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 22:06:49 executing program 0 (fault-call:8 fault-nth:32): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:06:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95ffffff00000000]}, 0x48) [ 1587.453844][T15386] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1587.474019][T15386] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1587.542195][T15386] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1587.576627][T15424] FAULT_INJECTION: forcing a failure. [ 1587.576627][T15424] name failslab, interval 1, probability 0, space 0, times 0 [ 1587.591050][T15424] CPU: 1 PID: 15424 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1587.600202][T15424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1587.606715][T15386] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1587.610262][T15424] Call Trace: [ 1587.610286][T15424] dump_stack+0x172/0x1f0 [ 1587.610309][T15424] should_fail.cold+0xa/0x15 [ 1587.610329][T15424] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1587.610352][T15424] ? ___might_sleep+0x163/0x280 [ 1587.610374][T15424] __should_failslab+0x121/0x190 [ 1587.610391][T15424] should_failslab+0x9/0x14 [ 1587.610409][T15424] __kmalloc+0x2dc/0x740 [ 1587.656450][T15424] ? af_alg_release+0x80/0x80 [ 1587.661141][T15424] ? kasan_check_write+0x14/0x20 [ 1587.666092][T15424] ? sock_kmalloc+0xc6/0x120 [ 1587.670668][T15424] sock_kmalloc+0xc6/0x120 [ 1587.675102][T15424] af_alg_alloc_areq+0x24/0x1e0 [ 1587.679937][T15424] aead_recvmsg+0x45d/0x1ab0 [ 1587.684529][T15424] ? aead_release+0x50/0x50 [ 1587.689014][T15424] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1587.694457][T15424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1587.700701][T15424] ? security_socket_recvmsg+0x9b/0xd0 [ 1587.706143][T15424] ? aead_release+0x50/0x50 [ 1587.710631][T15424] sock_recvmsg+0xd0/0x110 [ 1587.715031][T15424] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1587.720729][T15424] ___sys_recvmsg+0x273/0x5d0 [ 1587.725392][T15424] ? ___sys_sendmsg+0x930/0x930 [ 1587.730233][T15424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1587.736455][T15424] ? kasan_check_read+0x11/0x20 [ 1587.741295][T15424] ? __fget+0x381/0x550 [ 1587.745436][T15424] ? ksys_dup3+0x3e0/0x3e0 [ 1587.749834][T15424] ? lock_downgrade+0x880/0x880 [ 1587.754672][T15424] ? __fget_light+0x1a9/0x230 [ 1587.759353][T15424] ? __fdget+0x1b/0x20 [ 1587.763414][T15424] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1587.769634][T15424] __sys_recvmsg+0x102/0x1d0 [ 1587.774202][T15424] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1587.779474][T15424] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1587.784913][T15424] ? do_syscall_64+0x26/0x610 [ 1587.789587][T15424] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1587.795634][T15424] ? do_syscall_64+0x26/0x610 [ 1587.800295][T15424] __x64_sys_recvmsg+0x78/0xb0 [ 1587.805040][T15424] do_syscall_64+0x103/0x610 [ 1587.809689][T15424] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1587.815557][T15424] RIP: 0033:0x457e29 [ 1587.819438][T15424] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:06:50 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1da, 0x0) [ 1587.839020][T15424] RSP: 002b:00007f6a88447c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1587.847409][T15424] RAX: ffffffffffffffda RBX: 00007f6a88447c90 RCX: 0000000000457e29 [ 1587.855370][T15424] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 [ 1587.863321][T15424] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1587.871276][T15424] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a884486d4 [ 1587.879230][T15424] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 22:06:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000100)=""/23, 0x17}, {&(0x7f00000023c0)=""/4096, 0x1000}], 0x2}, 0x0) 22:06:50 executing program 0 (fault-call:8 fault-nth:33): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:06:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff00000000]}, 0x48) 22:06:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) syz_open_pts(r0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x10000, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000180)) bind$rose(r1, &(0x7f00000001c0)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}, 0x40) 22:06:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) [ 1588.163822][T15520] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1588.174642][T15520] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:06:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffffffffffff]}, 0x48) [ 1588.229671][T15527] FAULT_INJECTION: forcing a failure. [ 1588.229671][T15527] name failslab, interval 1, probability 0, space 0, times 0 [ 1588.242480][T15527] CPU: 1 PID: 15527 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1588.251590][T15527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1588.261636][T15527] Call Trace: [ 1588.264919][T15527] dump_stack+0x172/0x1f0 [ 1588.269238][T15527] should_fail.cold+0xa/0x15 [ 1588.273815][T15527] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1588.279605][T15527] ? ___might_sleep+0x163/0x280 [ 1588.284442][T15527] __should_failslab+0x121/0x190 [ 1588.289361][T15527] should_failslab+0x9/0x14 [ 1588.293844][T15527] __kmalloc+0x2dc/0x740 [ 1588.298093][T15527] ? af_alg_release+0x80/0x80 [ 1588.302750][T15527] ? kasan_check_write+0x14/0x20 [ 1588.307759][T15527] ? sock_kmalloc+0xc6/0x120 [ 1588.312334][T15527] sock_kmalloc+0xc6/0x120 [ 1588.316737][T15527] af_alg_alloc_areq+0x24/0x1e0 [ 1588.321568][T15527] aead_recvmsg+0x45d/0x1ab0 [ 1588.326153][T15527] ? aead_release+0x50/0x50 [ 1588.330639][T15527] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1588.336085][T15527] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1588.342309][T15527] ? security_socket_recvmsg+0x9b/0xd0 [ 1588.347760][T15527] ? aead_release+0x50/0x50 [ 1588.352249][T15527] sock_recvmsg+0xd0/0x110 [ 1588.356647][T15527] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1588.362361][T15527] ___sys_recvmsg+0x273/0x5d0 [ 1588.367031][T15527] ? ___sys_sendmsg+0x930/0x930 [ 1588.371862][T15527] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1588.378093][T15527] ? kasan_check_read+0x11/0x20 [ 1588.382932][T15527] ? __fget+0x381/0x550 [ 1588.387080][T15527] ? ksys_dup3+0x3e0/0x3e0 [ 1588.391495][T15527] ? lock_downgrade+0x880/0x880 [ 1588.396334][T15527] ? __fget_light+0x1a9/0x230 [ 1588.400999][T15527] ? __fdget+0x1b/0x20 [ 1588.405058][T15527] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1588.411291][T15527] __sys_recvmsg+0x102/0x1d0 [ 1588.415867][T15527] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1588.421582][T15527] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1588.427033][T15527] ? do_syscall_64+0x26/0x610 [ 1588.431694][T15527] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1588.437743][T15527] ? do_syscall_64+0x26/0x610 [ 1588.442410][T15527] __x64_sys_recvmsg+0x78/0xb0 [ 1588.447155][T15527] do_syscall_64+0x103/0x610 [ 1588.451817][T15527] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1588.457702][T15527] RIP: 0033:0x457e29 [ 1588.461581][T15527] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1588.481165][T15527] RSP: 002b:00007f6a88447c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1588.489571][T15527] RAX: ffffffffffffffda RBX: 00007f6a88447c90 RCX: 0000000000457e29 [ 1588.497526][T15527] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 [ 1588.505480][T15527] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1588.513465][T15527] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a884486d4 [ 1588.521433][T15527] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 22:06:51 executing program 0 (fault-call:8 fault-nth:34): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) [ 1588.551600][T15520] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1588.579675][T15520] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:06:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, 0x48) 22:06:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a000014006befcb0c4baf3cf00512cb9c97b64226b7cda8bd329636d6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x400}], 0x0, 0x0) 22:06:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) [ 1588.754272][T15542] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1588.786258][T15539] FAULT_INJECTION: forcing a failure. [ 1588.786258][T15539] name failslab, interval 1, probability 0, space 0, times 0 22:06:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f000000000000]}, 0x48) [ 1588.809155][T15539] CPU: 1 PID: 15539 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1588.818309][T15539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1588.828378][T15539] Call Trace: [ 1588.831694][T15539] dump_stack+0x172/0x1f0 [ 1588.836055][T15539] should_fail.cold+0xa/0x15 [ 1588.840672][T15539] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1588.846525][T15539] ? ___might_sleep+0x163/0x280 [ 1588.851402][T15539] __should_failslab+0x121/0x190 22:06:51 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1db, 0x0) [ 1588.856358][T15539] should_failslab+0x9/0x14 [ 1588.860880][T15539] __kmalloc+0x2dc/0x740 [ 1588.865162][T15539] ? af_alg_release+0x80/0x80 [ 1588.869862][T15539] ? kasan_check_write+0x14/0x20 [ 1588.874818][T15539] ? sock_kmalloc+0xc6/0x120 [ 1588.880300][T15539] sock_kmalloc+0xc6/0x120 [ 1588.884741][T15539] af_alg_alloc_areq+0x24/0x1e0 [ 1588.889603][T15539] aead_recvmsg+0x45d/0x1ab0 [ 1588.894216][T15539] ? aead_release+0x50/0x50 [ 1588.894236][T15539] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1588.904179][T15539] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1588.904198][T15539] ? security_socket_recvmsg+0x9b/0xd0 [ 1588.904214][T15539] ? aead_release+0x50/0x50 [ 1588.904232][T15539] sock_recvmsg+0xd0/0x110 [ 1588.904245][T15539] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1588.904258][T15539] ___sys_recvmsg+0x273/0x5d0 [ 1588.904275][T15539] ? ___sys_sendmsg+0x930/0x930 [ 1588.904287][T15539] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1588.904307][T15539] ? kasan_check_read+0x11/0x20 [ 1588.904328][T15539] ? __fget+0x381/0x550 [ 1588.904351][T15539] ? ksys_dup3+0x3e0/0x3e0 [ 1588.924908][T15539] ? lock_downgrade+0x880/0x880 [ 1588.924935][T15539] ? __fget_light+0x1a9/0x230 [ 1588.924952][T15539] ? __fdget+0x1b/0x20 [ 1588.924975][T15539] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1588.924997][T15539] __sys_recvmsg+0x102/0x1d0 [ 1588.925011][T15539] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1588.925036][T15539] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1588.925052][T15539] ? do_syscall_64+0x26/0x610 [ 1588.925069][T15539] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1588.925082][T15539] ? do_syscall_64+0x26/0x610 [ 1588.925101][T15539] __x64_sys_recvmsg+0x78/0xb0 [ 1588.925119][T15539] do_syscall_64+0x103/0x610 [ 1588.935497][T15539] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1588.935510][T15539] RIP: 0033:0x457e29 [ 1588.935525][T15539] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1588.935532][T15539] RSP: 002b:00007f6a88447c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f 22:06:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, 0x0, 0x0) [ 1589.057495][T15539] RAX: ffffffffffffffda RBX: 00007f6a88447c90 RCX: 0000000000457e29 [ 1589.065466][T15539] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 [ 1589.073436][T15539] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1589.081403][T15539] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a884486d4 [ 1589.089373][T15539] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 22:06:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ptype\x00') write$P9_RAUTH(r1, &(0x7f0000000180)={0x14, 0x67, 0x1, {0x20, 0x4, 0x7}}, 0x14) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) syz_open_pts(r0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) [ 1589.178192][T15760] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:06:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x48) 22:06:51 executing program 0 (fault-call:8 fault-nth:35): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:06:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe]}, 0x48) [ 1589.339271][T15760] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1589.391308][T15777] FAULT_INJECTION: forcing a failure. [ 1589.391308][T15777] name failslab, interval 1, probability 0, space 0, times 0 22:06:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) [ 1589.501089][T15785] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1589.515025][T15777] CPU: 1 PID: 15777 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1589.524171][T15777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1589.534224][T15777] Call Trace: [ 1589.537514][T15777] dump_stack+0x172/0x1f0 [ 1589.541838][T15777] should_fail.cold+0xa/0x15 [ 1589.546414][T15777] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1589.552207][T15777] ? ___might_sleep+0x163/0x280 [ 1589.557048][T15777] __should_failslab+0x121/0x190 [ 1589.561980][T15777] should_failslab+0x9/0x14 [ 1589.566480][T15777] __kmalloc+0x2dc/0x740 [ 1589.570727][T15777] ? af_alg_release+0x80/0x80 [ 1589.575399][T15777] ? kasan_check_write+0x14/0x20 [ 1589.580333][T15777] ? sock_kmalloc+0xc6/0x120 [ 1589.584928][T15777] sock_kmalloc+0xc6/0x120 [ 1589.589345][T15777] af_alg_alloc_areq+0x24/0x1e0 [ 1589.594196][T15777] aead_recvmsg+0x45d/0x1ab0 [ 1589.598797][T15777] ? aead_release+0x50/0x50 [ 1589.603296][T15777] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1589.608750][T15777] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1589.614986][T15777] ? security_socket_recvmsg+0x9b/0xd0 [ 1589.620444][T15777] ? aead_release+0x50/0x50 [ 1589.624951][T15777] sock_recvmsg+0xd0/0x110 [ 1589.629361][T15777] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1589.635090][T15777] ___sys_recvmsg+0x273/0x5d0 [ 1589.639770][T15777] ? ___sys_sendmsg+0x930/0x930 [ 1589.644616][T15777] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1589.650871][T15777] ? kasan_check_read+0x11/0x20 [ 1589.655727][T15777] ? __fget+0x381/0x550 [ 1589.659887][T15777] ? ksys_dup3+0x3e0/0x3e0 [ 1589.664308][T15777] ? lock_downgrade+0x880/0x880 [ 1589.669162][T15777] ? __fget_light+0x1a9/0x230 [ 1589.673835][T15777] ? __fdget+0x1b/0x20 [ 1589.677898][T15777] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1589.684161][T15777] __sys_recvmsg+0x102/0x1d0 [ 1589.688759][T15777] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1589.694054][T15777] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1589.699508][T15777] ? do_syscall_64+0x26/0x610 [ 1589.704187][T15777] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1589.710247][T15777] ? do_syscall_64+0x26/0x610 [ 1589.715107][T15777] __x64_sys_recvmsg+0x78/0xb0 [ 1589.719867][T15777] do_syscall_64+0x103/0x610 [ 1589.724469][T15777] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1589.730358][T15777] RIP: 0033:0x457e29 22:06:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) [ 1589.734249][T15777] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1589.753845][T15777] RSP: 002b:00007f6a88447c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1589.762271][T15777] RAX: ffffffffffffffda RBX: 00007f6a88447c90 RCX: 0000000000457e29 [ 1589.770236][T15777] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 [ 1589.778216][T15777] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1589.786195][T15777] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a884486d4 [ 1589.794165][T15777] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 22:06:52 executing program 0 (fault-call:8 fault-nth:36): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:06:52 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1dc, 0x0) [ 1589.879418][T15785] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:06:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:06:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, 0x0, 0x0) 22:06:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x48) 22:06:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) syz_open_pts(r0, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) [ 1590.073959][T15901] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:06:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x48) [ 1590.155650][T15901] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1590.171076][T15912] FAULT_INJECTION: forcing a failure. [ 1590.171076][T15912] name failslab, interval 1, probability 0, space 0, times 0 [ 1590.187898][T15912] CPU: 1 PID: 15912 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1590.197046][T15912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1590.207103][T15912] Call Trace: [ 1590.210403][T15912] dump_stack+0x172/0x1f0 [ 1590.214745][T15912] should_fail.cold+0xa/0x15 [ 1590.219347][T15912] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1590.225154][T15912] ? ___might_sleep+0x163/0x280 [ 1590.230013][T15912] __should_failslab+0x121/0x190 [ 1590.234972][T15912] should_failslab+0x9/0x14 [ 1590.239489][T15912] __kmalloc+0x2dc/0x740 [ 1590.243823][T15912] ? af_alg_release+0x80/0x80 [ 1590.248497][T15912] ? kasan_check_write+0x14/0x20 [ 1590.253437][T15912] ? sock_kmalloc+0xc6/0x120 [ 1590.258287][T15912] sock_kmalloc+0xc6/0x120 [ 1590.262708][T15912] af_alg_alloc_areq+0x24/0x1e0 [ 1590.267553][T15912] aead_recvmsg+0x45d/0x1ab0 [ 1590.272161][T15912] ? aead_release+0x50/0x50 [ 1590.276674][T15912] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1590.282132][T15912] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1590.288373][T15912] ? security_socket_recvmsg+0x9b/0xd0 [ 1590.293832][T15912] ? aead_release+0x50/0x50 [ 1590.298344][T15912] sock_recvmsg+0xd0/0x110 [ 1590.302755][T15912] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1590.308469][T15912] ___sys_recvmsg+0x273/0x5d0 [ 1590.313169][T15912] ? ___sys_sendmsg+0x930/0x930 [ 1590.318016][T15912] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1590.324258][T15912] ? kasan_check_read+0x11/0x20 [ 1590.329137][T15912] ? __fget+0x381/0x550 [ 1590.333302][T15912] ? ksys_dup3+0x3e0/0x3e0 [ 1590.337803][T15912] ? lock_downgrade+0x880/0x880 [ 1590.342656][T15912] ? __fget_light+0x1a9/0x230 [ 1590.347336][T15912] ? __fdget+0x1b/0x20 [ 1590.351403][T15912] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1590.357909][T15912] __sys_recvmsg+0x102/0x1d0 [ 1590.362498][T15912] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1590.367791][T15912] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1590.373249][T15912] ? do_syscall_64+0x26/0x610 [ 1590.377923][T15912] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1590.383984][T15912] ? do_syscall_64+0x26/0x610 [ 1590.388662][T15912] __x64_sys_recvmsg+0x78/0xb0 [ 1590.393431][T15912] do_syscall_64+0x103/0x610 [ 1590.398021][T15912] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1590.403906][T15912] RIP: 0033:0x457e29 [ 1590.407794][T15912] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1590.427392][T15912] RSP: 002b:00007f6a88447c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1590.435799][T15912] RAX: ffffffffffffffda RBX: 00007f6a88447c90 RCX: 0000000000457e29 [ 1590.443765][T15912] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 [ 1590.451730][T15912] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1590.459699][T15912] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a884486d4 [ 1590.467670][T15912] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 22:06:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0d4baf3cf00512cb9c97b64226b7cda8bd329636d6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x400}], 0x0, 0x0) 22:06:52 executing program 0 (fault-call:8 fault-nth:37): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:06:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x48) [ 1590.559928][T15925] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1590.570974][T15925] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:06:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:06:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x48) [ 1590.716719][T15937] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1590.739325][T15937] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1590.800363][T15937] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1590.811447][T15937] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:06:53 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1dd, 0x0) 22:06:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, 0x0, 0x0) 22:06:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:06:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x48) [ 1590.955757][T16056] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1590.981741][T16056] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1591.018457][T16066] FAULT_INJECTION: forcing a failure. [ 1591.018457][T16066] name failslab, interval 1, probability 0, space 0, times 0 [ 1591.031641][T16066] CPU: 0 PID: 16066 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1591.040772][T16066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1591.050841][T16066] Call Trace: [ 1591.054146][T16066] dump_stack+0x172/0x1f0 [ 1591.058505][T16066] should_fail.cold+0xa/0x15 [ 1591.063120][T16066] ? fault_create_debugfs_attr+0x1e0/0x1e0 22:06:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x48) 22:06:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x42, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm_plock\x00', 0x2000, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x101000, 0x0) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f00000003c0)={0x0, 0x1, &(0x7f0000000240)=""/224, &(0x7f0000000340)=""/42, &(0x7f0000000380)=""/49, 0x10d000}) getsockopt$inet6_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000400)=""/233, &(0x7f0000000500)=0xe9) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000200)={0x3, r2}) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000040)=0x1) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf, 0x1, 0x0, 0x400, 0x7, 0x20}) syz_open_pts(r0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) mkdirat(r2, &(0x7f0000000540)='./file0\x00', 0x4) [ 1591.068925][T16066] ? ___might_sleep+0x163/0x280 [ 1591.073786][T16066] __should_failslab+0x121/0x190 [ 1591.078730][T16066] should_failslab+0x9/0x14 [ 1591.083224][T16066] __kmalloc+0x2dc/0x740 [ 1591.087459][T16066] ? af_alg_release+0x80/0x80 [ 1591.092116][T16066] ? kasan_check_write+0x14/0x20 [ 1591.097037][T16066] ? sock_kmalloc+0xc6/0x120 [ 1591.101611][T16066] sock_kmalloc+0xc6/0x120 [ 1591.106022][T16066] af_alg_alloc_areq+0x24/0x1e0 [ 1591.110866][T16066] aead_recvmsg+0x45d/0x1ab0 [ 1591.115446][T16066] ? aead_release+0x50/0x50 [ 1591.119929][T16066] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1591.125378][T16066] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1591.131609][T16066] ? security_socket_recvmsg+0x9b/0xd0 [ 1591.137053][T16066] ? aead_release+0x50/0x50 [ 1591.141536][T16066] sock_recvmsg+0xd0/0x110 [ 1591.145945][T16066] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1591.151742][T16066] ___sys_recvmsg+0x273/0x5d0 [ 1591.156418][T16066] ? ___sys_sendmsg+0x930/0x930 [ 1591.161249][T16066] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1591.167468][T16066] ? kasan_check_read+0x11/0x20 [ 1591.172303][T16066] ? __fget+0x381/0x550 [ 1591.176456][T16066] ? ksys_dup3+0x3e0/0x3e0 [ 1591.180854][T16066] ? lock_downgrade+0x880/0x880 [ 1591.185720][T16066] ? __fget_light+0x1a9/0x230 [ 1591.190387][T16066] ? __fdget+0x1b/0x20 [ 1591.194444][T16066] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1591.200673][T16066] __sys_recvmsg+0x102/0x1d0 [ 1591.205251][T16066] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1591.210530][T16066] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1591.215967][T16066] ? do_syscall_64+0x26/0x610 [ 1591.220622][T16066] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1591.226668][T16066] ? do_syscall_64+0x26/0x610 [ 1591.231327][T16066] __x64_sys_recvmsg+0x78/0xb0 [ 1591.236071][T16066] do_syscall_64+0x103/0x610 [ 1591.240641][T16066] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1591.246518][T16066] RIP: 0033:0x457e29 [ 1591.250424][T16066] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1591.270018][T16066] RSP: 002b:00007f6a88447c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1591.278421][T16066] RAX: ffffffffffffffda RBX: 00007f6a88447c90 RCX: 0000000000457e29 [ 1591.286386][T16066] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 [ 1591.294356][T16066] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1591.302316][T16066] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a884486d4 [ 1591.310269][T16066] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 22:06:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:06:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x48) [ 1591.419187][T16077] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1591.448331][T16077] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:06:53 executing program 0 (fault-call:8 fault-nth:38): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:06:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x48) [ 1591.541032][T16077] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1591.569035][T16077] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1591.580716][ C0] print_req_error: 478 callbacks suppressed [ 1591.580727][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1591.594181][ C0] buffer_io_error: 478 callbacks suppressed [ 1591.594190][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1591.608808][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1591.616193][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1591.625511][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1591.632903][ C0] Buffer I/O error on dev loop0, logical block 0, async page read 22:06:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}, 0x48) 22:06:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) [ 1591.641102][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1591.648309][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1591.654837][T16094] FAULT_INJECTION: forcing a failure. [ 1591.654837][T16094] name failslab, interval 1, probability 0, space 0, times 0 [ 1591.661767][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1591.669649][T16094] CPU: 0 PID: 16094 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1591.676016][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1591.685063][T16094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1591.685069][T16094] Call Trace: [ 1591.685088][T16094] dump_stack+0x172/0x1f0 [ 1591.685106][T16094] should_fail.cold+0xa/0x15 [ 1591.685122][T16094] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1591.685142][T16094] ? ___might_sleep+0x163/0x280 [ 1591.693463][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1591.702958][T16094] __should_failslab+0x121/0x190 [ 1591.702988][T16094] should_failslab+0x9/0x14 [ 1591.703008][T16094] __kmalloc+0x2dc/0x740 [ 1591.703047][T16094] ? af_alg_release+0x80/0x80 [ 1591.706306][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1591.710615][T16094] ? kasan_check_write+0x14/0x20 [ 1591.721524][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1591.725788][T16094] ? sock_kmalloc+0xc6/0x120 [ 1591.725807][T16094] sock_kmalloc+0xc6/0x120 [ 1591.725826][T16094] af_alg_alloc_areq+0x24/0x1e0 [ 1591.725845][T16094] aead_recvmsg+0x45d/0x1ab0 [ 1591.732955][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1591.737863][T16094] ? aead_release+0x50/0x50 [ 1591.757391][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1591.758991][T16094] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1591.759013][T16094] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1591.759033][T16094] ? security_socket_recvmsg+0x9b/0xd0 [ 1591.763981][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1591.771036][T16094] ? aead_release+0x50/0x50 [ 1591.780926][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1591.784833][T16094] sock_recvmsg+0xd0/0x110 [ 1591.784848][T16094] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1591.784862][T16094] ___sys_recvmsg+0x273/0x5d0 [ 1591.784881][T16094] ? ___sys_sendmsg+0x930/0x930 [ 1591.784901][T16094] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1591.789464][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1591.797243][T16094] ? kasan_check_read+0x11/0x20 [ 1591.797260][T16094] ? __fget+0x381/0x550 [ 1591.797280][T16094] ? ksys_dup3+0x3e0/0x3e0 [ 1591.802199][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1591.808840][T16094] ? lock_downgrade+0x880/0x880 [ 1591.808865][T16094] ? __fget_light+0x1a9/0x230 [ 1591.808881][T16094] ? __fdget+0x1b/0x20 [ 1591.808897][T16094] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1591.808918][T16094] __sys_recvmsg+0x102/0x1d0 [ 1591.814371][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1591.820570][T16094] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1591.936606][T16094] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1591.942044][T16094] ? do_syscall_64+0x26/0x610 [ 1591.946706][T16094] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1591.952758][T16094] ? do_syscall_64+0x26/0x610 [ 1591.957420][T16094] __x64_sys_recvmsg+0x78/0xb0 [ 1591.962163][T16094] do_syscall_64+0x103/0x610 [ 1591.966744][T16094] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1591.972615][T16094] RIP: 0033:0x457e29 [ 1591.976522][T16094] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1591.996104][T16094] RSP: 002b:00007f6a88447c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1592.004495][T16094] RAX: ffffffffffffffda RBX: 00007f6a88447c90 RCX: 0000000000457e29 [ 1592.012457][T16094] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 [ 1592.020411][T16094] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1592.028361][T16094] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a884486d4 [ 1592.036312][T16094] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 [ 1592.051174][ C0] net_ratelimit: 24 callbacks suppressed [ 1592.051182][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1592.057022][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:06:54 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1de, 0x0) 22:06:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) 22:06:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, 0x48) [ 1592.170548][T16205] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode 22:06:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) socket$bt_hidp(0x1f, 0x3, 0x6) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x30000, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000200)=0x78) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) syz_open_pts(r0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) 22:06:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, 0x48) [ 1592.212784][T16205] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:06:54 executing program 0 (fault-call:8 fault-nth:39): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) [ 1592.297659][T16205] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1592.336984][T16205] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:06:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}, 0x48) 22:06:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:06:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}, 0x48) [ 1592.496159][T16234] FAULT_INJECTION: forcing a failure. [ 1592.496159][T16234] name failslab, interval 1, probability 0, space 0, times 0 [ 1592.551979][T16234] CPU: 0 PID: 16234 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1592.561123][T16234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1592.561133][T16234] Call Trace: [ 1592.561169][T16234] dump_stack+0x172/0x1f0 [ 1592.561201][T16234] should_fail.cold+0xa/0x15 [ 1592.561221][T16234] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1592.561256][T16234] ? ___might_sleep+0x163/0x280 [ 1592.583556][T16234] __should_failslab+0x121/0x190 [ 1592.583580][T16234] should_failslab+0x9/0x14 [ 1592.583600][T16234] __kmalloc+0x2dc/0x740 [ 1592.583622][T16234] ? af_alg_release+0x80/0x80 [ 1592.583633][T16234] ? kasan_check_write+0x14/0x20 [ 1592.583652][T16234] ? sock_kmalloc+0xc6/0x120 [ 1592.583665][T16234] sock_kmalloc+0xc6/0x120 [ 1592.583688][T16234] af_alg_alloc_areq+0x24/0x1e0 [ 1592.583703][T16234] aead_recvmsg+0x45d/0x1ab0 [ 1592.583729][T16234] ? aead_release+0x50/0x50 [ 1592.583746][T16234] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1592.583765][T16234] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1592.583785][T16234] ? security_socket_recvmsg+0x9b/0xd0 [ 1592.583808][T16234] ? aead_release+0x50/0x50 [ 1592.662103][T16234] sock_recvmsg+0xd0/0x110 [ 1592.662748][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1592.666511][T16234] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1592.672255][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1592.677907][T16234] ___sys_recvmsg+0x273/0x5d0 [ 1592.677930][T16234] ? ___sys_sendmsg+0x930/0x930 [ 1592.677950][T16234] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1592.683746][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1592.688298][T16234] ? kasan_check_read+0x11/0x20 [ 1592.693171][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1592.699339][T16234] ? __fget+0x381/0x550 [ 1592.719677][T16234] ? ksys_dup3+0x3e0/0x3e0 [ 1592.724077][T16234] ? lock_downgrade+0x880/0x880 [ 1592.728921][T16234] ? __fget_light+0x1a9/0x230 [ 1592.733596][T16234] ? __fdget+0x1b/0x20 [ 1592.737652][T16234] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1592.743881][T16234] __sys_recvmsg+0x102/0x1d0 [ 1592.748467][T16234] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1592.753762][T16234] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1592.759203][T16234] ? do_syscall_64+0x26/0x610 [ 1592.763859][T16234] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1592.769906][T16234] ? do_syscall_64+0x26/0x610 [ 1592.774587][T16234] __x64_sys_recvmsg+0x78/0xb0 [ 1592.779332][T16234] do_syscall_64+0x103/0x610 [ 1592.783919][T16234] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1592.789792][T16234] RIP: 0033:0x457e29 [ 1592.793677][T16234] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1592.813261][T16234] RSP: 002b:00007f6a88447c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1592.821659][T16234] RAX: ffffffffffffffda RBX: 00007f6a88447c90 RCX: 0000000000457e29 [ 1592.829612][T16234] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 [ 1592.837596][T16234] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1592.845578][T16234] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a884486d4 22:06:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85]}, 0x48) [ 1592.853558][T16234] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 [ 1592.902379][T16238] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1592.912565][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1592.912668][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1592.931586][T16238] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:06:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe]}, 0x48) 22:06:55 executing program 0 (fault-call:8 fault-nth:40): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:06:55 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1df, 0x0) 22:06:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c6eaf3cf00512cb9c97b64226b7cda8bd329636d6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x400}], 0x0, 0x0) 22:06:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) 22:06:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mixer\x00', 0x400000, 0x0) bind$bt_rfcomm(r1, &(0x7f00000002c0)={0x1f, {0x7fff, 0x200, 0x200, 0x2, 0x6, 0x4}, 0xfff}, 0xa) syz_open_pts(r0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x1, 0x4) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) 22:06:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x220]}, 0x48) [ 1593.222715][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1593.228534][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1593.244477][T16367] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode 22:06:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x48) [ 1593.272491][T16367] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1593.379215][T16367] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1593.402381][T16367] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:06:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x48) [ 1593.434395][T16385] FAULT_INJECTION: forcing a failure. [ 1593.434395][T16385] name failslab, interval 1, probability 0, space 0, times 0 [ 1593.449236][T16385] CPU: 0 PID: 16385 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1593.458377][T16385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1593.468436][T16385] Call Trace: [ 1593.471717][T16385] dump_stack+0x172/0x1f0 [ 1593.476057][T16385] should_fail.cold+0xa/0x15 [ 1593.480648][T16385] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1593.486440][T16385] ? ___might_sleep+0x163/0x280 [ 1593.491287][T16385] __should_failslab+0x121/0x190 [ 1593.496232][T16385] should_failslab+0x9/0x14 [ 1593.500730][T16385] __kmalloc+0x2dc/0x740 [ 1593.504957][T16385] ? af_alg_release+0x80/0x80 [ 1593.509621][T16385] ? kasan_check_write+0x14/0x20 [ 1593.514569][T16385] ? sock_kmalloc+0xc6/0x120 [ 1593.519177][T16385] sock_kmalloc+0xc6/0x120 [ 1593.523582][T16385] af_alg_alloc_areq+0x24/0x1e0 [ 1593.528423][T16385] aead_recvmsg+0x45d/0x1ab0 [ 1593.533310][T16385] ? aead_release+0x50/0x50 [ 1593.537813][T16385] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1593.543259][T16385] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1593.549491][T16385] ? security_socket_recvmsg+0x9b/0xd0 [ 1593.554949][T16385] ? aead_release+0x50/0x50 [ 1593.559461][T16385] sock_recvmsg+0xd0/0x110 [ 1593.563877][T16385] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1593.569607][T16385] ___sys_recvmsg+0x273/0x5d0 [ 1593.574283][T16385] ? ___sys_sendmsg+0x930/0x930 [ 1593.579128][T16385] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1593.585355][T16385] ? kasan_check_read+0x11/0x20 [ 1593.590189][T16385] ? __fget+0x381/0x550 [ 1593.594340][T16385] ? ksys_dup3+0x3e0/0x3e0 [ 1593.598748][T16385] ? lock_downgrade+0x880/0x880 [ 1593.603592][T16385] ? __fget_light+0x1a9/0x230 [ 1593.608261][T16385] ? __fdget+0x1b/0x20 [ 1593.612424][T16385] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1593.618650][T16385] __sys_recvmsg+0x102/0x1d0 [ 1593.623230][T16385] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1593.628520][T16385] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1593.633972][T16385] ? do_syscall_64+0x26/0x610 [ 1593.638640][T16385] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1593.644689][T16385] ? do_syscall_64+0x26/0x610 [ 1593.649367][T16385] __x64_sys_recvmsg+0x78/0xb0 [ 1593.654161][T16385] do_syscall_64+0x103/0x610 [ 1593.658748][T16385] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1593.664635][T16385] RIP: 0033:0x457e29 [ 1593.668515][T16385] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1593.688104][T16385] RSP: 002b:00007f6a88447c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1593.696510][T16385] RAX: ffffffffffffffda RBX: 00007f6a88447c90 RCX: 0000000000457e29 [ 1593.704475][T16385] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 [ 1593.712446][T16385] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1593.720403][T16385] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a884486d4 [ 1593.728380][T16385] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 22:06:56 executing program 0 (fault-call:8 fault-nth:41): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:06:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:06:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x48) 22:06:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x48) [ 1593.908558][T16396] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1593.942407][T16396] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1593.979085][T16402] FAULT_INJECTION: forcing a failure. [ 1593.979085][T16402] name failslab, interval 1, probability 0, space 0, times 0 [ 1593.992687][T16402] CPU: 1 PID: 16402 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1594.001804][T16402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1594.001812][T16402] Call Trace: [ 1594.001836][T16402] dump_stack+0x172/0x1f0 [ 1594.001857][T16402] should_fail.cold+0xa/0x15 [ 1594.001876][T16402] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1594.001899][T16402] ? ___might_sleep+0x163/0x280 [ 1594.001920][T16402] __should_failslab+0x121/0x190 [ 1594.001940][T16402] should_failslab+0x9/0x14 [ 1594.001957][T16402] __kmalloc+0x2dc/0x740 [ 1594.001976][T16402] ? af_alg_release+0x80/0x80 [ 1594.001991][T16402] ? kasan_check_write+0x14/0x20 [ 1594.002006][T16402] ? sock_kmalloc+0xc6/0x120 [ 1594.002025][T16402] sock_kmalloc+0xc6/0x120 [ 1594.034884][T16402] af_alg_alloc_areq+0x24/0x1e0 [ 1594.034903][T16402] aead_recvmsg+0x45d/0x1ab0 22:06:56 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1e0, 0x0) 22:06:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) [ 1594.034935][T16402] ? aead_release+0x50/0x50 [ 1594.034951][T16402] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1594.034968][T16402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1594.034989][T16402] ? security_socket_recvmsg+0x9b/0xd0 [ 1594.098216][T16402] ? aead_release+0x50/0x50 [ 1594.102732][T16402] sock_recvmsg+0xd0/0x110 [ 1594.107161][T16402] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1594.112892][T16402] ___sys_recvmsg+0x273/0x5d0 [ 1594.117591][T16402] ? ___sys_sendmsg+0x930/0x930 [ 1594.122447][T16402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 22:06:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) syz_open_pts(r0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000340), &(0x7f0000000380)=0x4) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x5, 0x101000) write$UHID_CREATE2(r2, &(0x7f0000000180)={0xb, 'syz0\x00', 'syz1\x00', 'syz1\x00', 0x6d, 0x941b, 0x2, 0x7fffffff, 0xb98, 0x101, "171720492187a964aca01d6b0c2adada2e521b6a522735f4acceaa93fd74f4851a9f6fa8dca288d91d7c6b99329271b8af76f447cb07818d4df6d54804d9e19ba94fe8fb23742cedb5fac6de891cd2d744428c1c8312c63efcc9dc8daf55bfa72cf5089798392e9e18a84b109d"}, 0x185) [ 1594.122473][T16402] ? kasan_check_read+0x11/0x20 [ 1594.133551][T16402] ? __fget+0x381/0x550 [ 1594.137717][T16402] ? ksys_dup3+0x3e0/0x3e0 [ 1594.137733][T16402] ? lock_downgrade+0x880/0x880 [ 1594.137755][T16402] ? __fget_light+0x1a9/0x230 [ 1594.137772][T16402] ? __fdget+0x1b/0x20 [ 1594.155870][T16402] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1594.162119][T16402] __sys_recvmsg+0x102/0x1d0 [ 1594.162137][T16402] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1594.162167][T16402] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1594.162179][T16402] ? do_syscall_64+0x26/0x610 [ 1594.162200][T16402] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1594.172041][T16402] ? do_syscall_64+0x26/0x610 [ 1594.172064][T16402] __x64_sys_recvmsg+0x78/0xb0 [ 1594.172081][T16402] do_syscall_64+0x103/0x610 [ 1594.172100][T16402] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1594.172115][T16402] RIP: 0033:0x457e29 [ 1594.211983][T16402] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1594.231588][T16402] RSP: 002b:00007f6a88447c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1594.240007][T16402] RAX: ffffffffffffffda RBX: 00007f6a88447c90 RCX: 0000000000457e29 [ 1594.247972][T16402] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 [ 1594.255933][T16402] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1594.263901][T16402] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a884486d4 [ 1594.271867][T16402] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 22:06:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}, 0x48) [ 1594.331743][T16396] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode 22:06:56 executing program 2: socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x40, 0x0) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f00000001c0)=0xc) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) syz_open_pts(r1, 0x80) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) [ 1594.379734][T16396] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:06:56 executing program 0 (fault-call:8 fault-nth:42): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:06:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:06:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x48) 22:06:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) syz_open_pts(r0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) [ 1594.574156][T16638] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1594.584519][T16638] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:06:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:06:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1018]}, 0x48) [ 1594.679083][T16648] FAULT_INJECTION: forcing a failure. [ 1594.679083][T16648] name failslab, interval 1, probability 0, space 0, times 0 [ 1594.697547][T16648] CPU: 1 PID: 16648 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1594.706679][T16648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1594.716737][T16648] Call Trace: [ 1594.720027][T16648] dump_stack+0x172/0x1f0 [ 1594.724355][T16648] should_fail.cold+0xa/0x15 [ 1594.728945][T16648] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1594.734746][T16648] ? ___might_sleep+0x163/0x280 [ 1594.739596][T16648] __should_failslab+0x121/0x190 [ 1594.744527][T16648] should_failslab+0x9/0x14 [ 1594.749018][T16648] __kmalloc+0x2dc/0x740 [ 1594.753259][T16648] ? af_alg_release+0x80/0x80 [ 1594.757928][T16648] ? kasan_check_write+0x14/0x20 [ 1594.762861][T16648] ? sock_kmalloc+0xc6/0x120 [ 1594.767445][T16648] sock_kmalloc+0xc6/0x120 [ 1594.771851][T16648] af_alg_alloc_areq+0x24/0x1e0 [ 1594.776695][T16648] aead_recvmsg+0x45d/0x1ab0 [ 1594.781294][T16648] ? aead_release+0x50/0x50 [ 1594.785793][T16648] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1594.791241][T16648] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1594.797478][T16648] ? security_socket_recvmsg+0x9b/0xd0 [ 1594.802937][T16648] ? aead_release+0x50/0x50 [ 1594.807429][T16648] sock_recvmsg+0xd0/0x110 [ 1594.811837][T16648] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1594.817548][T16648] ___sys_recvmsg+0x273/0x5d0 [ 1594.822220][T16648] ? ___sys_sendmsg+0x930/0x930 [ 1594.827153][T16648] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1594.833390][T16648] ? kasan_check_read+0x11/0x20 [ 1594.838238][T16648] ? __fget+0x381/0x550 [ 1594.842395][T16648] ? ksys_dup3+0x3e0/0x3e0 [ 1594.846800][T16648] ? lock_downgrade+0x880/0x880 [ 1594.851649][T16648] ? __fget_light+0x1a9/0x230 [ 1594.856321][T16648] ? __fdget+0x1b/0x20 [ 1594.860383][T16648] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1594.866735][T16648] __sys_recvmsg+0x102/0x1d0 [ 1594.871321][T16648] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1594.876612][T16648] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1594.882059][T16648] ? do_syscall_64+0x26/0x610 [ 1594.886728][T16648] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1594.892783][T16648] ? do_syscall_64+0x26/0x610 [ 1594.897455][T16648] __x64_sys_recvmsg+0x78/0xb0 [ 1594.902222][T16648] do_syscall_64+0x103/0x610 [ 1594.906814][T16648] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1594.912692][T16648] RIP: 0033:0x457e29 [ 1594.916576][T16648] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1594.936167][T16648] RSP: 002b:00007f6a88447c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1594.944570][T16648] RAX: ffffffffffffffda RBX: 00007f6a88447c90 RCX: 0000000000457e29 [ 1594.952529][T16648] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 [ 1594.960494][T16648] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1594.968452][T16648] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a884486d4 [ 1594.976416][T16648] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 22:06:57 executing program 0 (fault-call:8 fault-nth:43): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) [ 1595.008080][T16651] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1595.044953][T16651] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:06:57 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1e1, 0x0) 22:06:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1810]}, 0x48) 22:06:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000100)=""/23, 0x17}], 0x1}, 0x0) 22:06:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf00212cb9c97b64226b7cda8bd329636d6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x400}], 0x0, 0x0) [ 1595.129784][T16651] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1595.154547][T16651] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:06:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x48) [ 1595.258559][T16773] FAULT_INJECTION: forcing a failure. [ 1595.258559][T16773] name failslab, interval 1, probability 0, space 0, times 0 [ 1595.271550][T16773] CPU: 0 PID: 16773 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1595.280745][T16773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1595.290894][T16773] Call Trace: [ 1595.294171][T16773] dump_stack+0x172/0x1f0 [ 1595.298499][T16773] should_fail.cold+0xa/0x15 [ 1595.303095][T16773] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1595.308909][T16773] ? ___might_sleep+0x163/0x280 [ 1595.313754][T16773] __should_failslab+0x121/0x190 [ 1595.318669][T16773] should_failslab+0x9/0x14 [ 1595.323159][T16773] __kmalloc+0x2dc/0x740 [ 1595.327407][T16773] ? af_alg_release+0x80/0x80 [ 1595.332079][T16773] ? kasan_check_write+0x14/0x20 [ 1595.336995][T16773] ? sock_kmalloc+0xc6/0x120 [ 1595.341567][T16773] sock_kmalloc+0xc6/0x120 [ 1595.345976][T16773] af_alg_alloc_areq+0x24/0x1e0 [ 1595.350816][T16773] aead_recvmsg+0x45d/0x1ab0 [ 1595.355394][T16773] ? aead_release+0x50/0x50 [ 1595.359877][T16773] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1595.365327][T16773] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1595.371555][T16773] ? security_socket_recvmsg+0x9b/0xd0 [ 1595.376992][T16773] ? aead_release+0x50/0x50 [ 1595.381476][T16773] sock_recvmsg+0xd0/0x110 [ 1595.385880][T16773] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1595.391587][T16773] ___sys_recvmsg+0x273/0x5d0 [ 1595.396256][T16773] ? ___sys_sendmsg+0x930/0x930 [ 1595.401097][T16773] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1595.407332][T16773] ? kasan_check_read+0x11/0x20 [ 1595.412176][T16773] ? __fget+0x381/0x550 [ 1595.416330][T16773] ? ksys_dup3+0x3e0/0x3e0 [ 1595.420736][T16773] ? lock_downgrade+0x880/0x880 [ 1595.425596][T16773] ? __fget_light+0x1a9/0x230 [ 1595.430260][T16773] ? __fdget+0x1b/0x20 [ 1595.434316][T16773] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1595.440539][T16773] __sys_recvmsg+0x102/0x1d0 [ 1595.445121][T16773] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1595.450421][T16773] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1595.455871][T16773] ? do_syscall_64+0x26/0x610 [ 1595.460535][T16773] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1595.466591][T16773] ? do_syscall_64+0x26/0x610 [ 1595.471277][T16773] __x64_sys_recvmsg+0x78/0xb0 [ 1595.476034][T16773] do_syscall_64+0x103/0x610 [ 1595.480609][T16773] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1595.486487][T16773] RIP: 0033:0x457e29 22:06:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) syz_open_pts(r0, 0x0) r1 = gettid() get_robust_list(r1, &(0x7f0000000180)=&(0x7f0000000040), &(0x7f00000001c0)=0x18) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) 22:06:58 executing program 0 (fault-call:8 fault-nth:44): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) [ 1595.490372][T16773] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1595.509951][T16773] RSP: 002b:00007f6a88447c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1595.518349][T16773] RAX: ffffffffffffffda RBX: 00007f6a88447c90 RCX: 0000000000457e29 [ 1595.526317][T16773] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 [ 1595.534555][T16773] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1595.542523][T16773] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a884486d4 [ 1595.550480][T16773] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 22:06:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2002]}, 0x48) [ 1595.671717][T16785] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1595.697745][T16785] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1595.741801][T16791] FAULT_INJECTION: forcing a failure. [ 1595.741801][T16791] name failslab, interval 1, probability 0, space 0, times 0 [ 1595.755322][T16791] CPU: 0 PID: 16791 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1595.764516][T16791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1595.774576][T16791] Call Trace: [ 1595.777853][T16791] dump_stack+0x172/0x1f0 [ 1595.782170][T16791] should_fail.cold+0xa/0x15 [ 1595.786740][T16791] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1595.792526][T16791] ? ___might_sleep+0x163/0x280 [ 1595.797360][T16791] __should_failslab+0x121/0x190 [ 1595.802279][T16791] should_failslab+0x9/0x14 [ 1595.806772][T16791] __kmalloc+0x2dc/0x740 [ 1595.810997][T16791] ? af_alg_release+0x80/0x80 [ 1595.815655][T16791] ? kasan_check_write+0x14/0x20 [ 1595.820578][T16791] ? sock_kmalloc+0xc6/0x120 [ 1595.825151][T16791] sock_kmalloc+0xc6/0x120 [ 1595.829552][T16791] af_alg_alloc_areq+0x24/0x1e0 [ 1595.834381][T16791] aead_recvmsg+0x45d/0x1ab0 [ 1595.838966][T16791] ? aead_release+0x50/0x50 [ 1595.843450][T16791] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1595.848888][T16791] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1595.855109][T16791] ? security_socket_recvmsg+0x9b/0xd0 [ 1595.860548][T16791] ? aead_release+0x50/0x50 [ 1595.865028][T16791] sock_recvmsg+0xd0/0x110 [ 1595.869428][T16791] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1595.875136][T16791] ___sys_recvmsg+0x273/0x5d0 [ 1595.879797][T16791] ? ___sys_sendmsg+0x930/0x930 [ 1595.884629][T16791] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1595.890853][T16791] ? kasan_check_read+0x11/0x20 [ 1595.895689][T16791] ? __fget+0x381/0x550 [ 1595.899827][T16791] ? ksys_dup3+0x3e0/0x3e0 [ 1595.904221][T16791] ? lock_downgrade+0x880/0x880 [ 1595.909055][T16791] ? __fget_light+0x1a9/0x230 [ 1595.913710][T16791] ? __fdget+0x1b/0x20 [ 1595.917755][T16791] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1595.923975][T16791] __sys_recvmsg+0x102/0x1d0 [ 1595.928543][T16791] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1595.933813][T16791] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1595.939247][T16791] ? do_syscall_64+0x26/0x610 [ 1595.943909][T16791] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1595.949953][T16791] ? do_syscall_64+0x26/0x610 [ 1595.954613][T16791] __x64_sys_recvmsg+0x78/0xb0 [ 1595.959358][T16791] do_syscall_64+0x103/0x610 [ 1595.963934][T16791] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1595.969802][T16791] RIP: 0033:0x457e29 [ 1595.973682][T16791] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1595.993264][T16791] RSP: 002b:00007f6a88447c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1596.001669][T16791] RAX: ffffffffffffffda RBX: 00007f6a88447c90 RCX: 0000000000457e29 [ 1596.009620][T16791] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 [ 1596.017574][T16791] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1596.025523][T16791] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a884486d4 [ 1596.033485][T16791] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 22:06:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000100)=""/23, 0x17}], 0x1}, 0x0) [ 1596.090915][T16785] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode 22:06:58 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1e2, 0x0) [ 1596.143941][T16785] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:06:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x48) 22:06:58 executing program 0 (fault-call:8 fault-nth:45): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:06:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:06:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800]}, 0x48) [ 1596.317479][T16914] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1596.334376][T16914] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1596.378175][T16918] FAULT_INJECTION: forcing a failure. [ 1596.378175][T16918] name failslab, interval 1, probability 0, space 0, times 0 [ 1596.393942][T16918] CPU: 0 PID: 16918 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1596.403062][T16918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1596.413100][T16918] Call Trace: [ 1596.416385][T16918] dump_stack+0x172/0x1f0 [ 1596.420700][T16918] should_fail.cold+0xa/0x15 [ 1596.425272][T16918] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1596.431063][T16918] ? ___might_sleep+0x163/0x280 [ 1596.435899][T16918] __should_failslab+0x121/0x190 [ 1596.440819][T16918] should_failslab+0x9/0x14 [ 1596.445301][T16918] __kmalloc+0x2dc/0x740 [ 1596.449525][T16918] ? af_alg_release+0x80/0x80 [ 1596.454179][T16918] ? kasan_check_write+0x14/0x20 [ 1596.459096][T16918] ? sock_kmalloc+0xc6/0x120 [ 1596.463667][T16918] sock_kmalloc+0xc6/0x120 [ 1596.468062][T16918] af_alg_alloc_areq+0x24/0x1e0 [ 1596.472894][T16918] aead_recvmsg+0x45d/0x1ab0 [ 1596.477488][T16918] ? aead_release+0x50/0x50 [ 1596.481984][T16918] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1596.487423][T16918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1596.493647][T16918] ? security_socket_recvmsg+0x9b/0xd0 [ 1596.499095][T16918] ? aead_release+0x50/0x50 [ 1596.503580][T16918] sock_recvmsg+0xd0/0x110 [ 1596.507979][T16918] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1596.513676][T16918] ___sys_recvmsg+0x273/0x5d0 [ 1596.518337][T16918] ? ___sys_sendmsg+0x930/0x930 [ 1596.523174][T16918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1596.529395][T16918] ? kasan_check_read+0x11/0x20 [ 1596.534228][T16918] ? __fget+0x381/0x550 [ 1596.538371][T16918] ? ksys_dup3+0x3e0/0x3e0 [ 1596.542776][T16918] ? lock_downgrade+0x880/0x880 [ 1596.547616][T16918] ? __fget_light+0x1a9/0x230 [ 1596.552275][T16918] ? __fdget+0x1b/0x20 [ 1596.556327][T16918] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1596.562555][T16918] __sys_recvmsg+0x102/0x1d0 [ 1596.567128][T16918] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1596.572403][T16918] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1596.577840][T16918] ? do_syscall_64+0x26/0x610 [ 1596.582499][T16918] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1596.588555][T16918] ? do_syscall_64+0x26/0x610 [ 1596.593217][T16918] __x64_sys_recvmsg+0x78/0xb0 [ 1596.597964][T16918] do_syscall_64+0x103/0x610 [ 1596.602537][T16918] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1596.608407][T16918] RIP: 0033:0x457e29 [ 1596.612283][T16918] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1596.631865][T16918] RSP: 002b:00007f6a88447c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1596.640256][T16918] RAX: ffffffffffffffda RBX: 00007f6a88447c90 RCX: 0000000000457e29 [ 1596.648226][T16918] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 [ 1596.656177][T16918] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1596.664128][T16918] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a884486d4 [ 1596.672078][T16918] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 22:06:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) syz_open_pts(r0, 0x0) pselect6(0x3ca, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) 22:06:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00]}, 0x48) [ 1596.712234][T16914] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1596.736955][T16914] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:06:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:06:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800]}, 0x48) 22:06:59 executing program 0 (fault-call:8 fault-nth:46): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:06:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000100)=""/23, 0x17}], 0x1}, 0x0) [ 1596.959201][ C0] print_req_error: 478 callbacks suppressed [ 1596.959212][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1596.972648][ C0] buffer_io_error: 478 callbacks suppressed [ 1596.972657][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1596.987058][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1596.994355][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1597.007754][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1597.014942][ C1] Buffer I/O error on dev loop0, logical block 0, async page read 22:06:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00]}, 0x48) [ 1597.062797][ C0] net_ratelimit: 16 callbacks suppressed [ 1597.062805][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1597.072717][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1597.074528][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1597.080150][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1597.080219][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1597.080252][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1597.103448][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 22:06:59 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1e3, 0x0) [ 1597.110564][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1597.146308][T17044] FAULT_INJECTION: forcing a failure. [ 1597.146308][T17044] name failslab, interval 1, probability 0, space 0, times 0 [ 1597.163453][T17044] CPU: 0 PID: 17044 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1597.172590][T17044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1597.178104][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1597.182725][T17044] Call Trace: [ 1597.182750][T17044] dump_stack+0x172/0x1f0 [ 1597.182773][T17044] should_fail.cold+0xa/0x15 [ 1597.189860][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1597.193129][T17044] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1597.193149][T17044] ? ___might_sleep+0x163/0x280 [ 1597.193167][T17044] __should_failslab+0x121/0x190 [ 1597.193186][T17044] should_failslab+0x9/0x14 [ 1597.200031][T17042] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1597.202059][T17044] __kmalloc+0x2dc/0x740 [ 1597.213176][T17042] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1597.215717][T17044] ? af_alg_release+0x80/0x80 [ 1597.215734][T17044] ? kasan_check_write+0x14/0x20 [ 1597.215754][T17044] ? sock_kmalloc+0xc6/0x120 [ 1597.221156][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1597.225516][T17044] sock_kmalloc+0xc6/0x120 [ 1597.225535][T17044] af_alg_alloc_areq+0x24/0x1e0 [ 1597.225555][T17044] aead_recvmsg+0x45d/0x1ab0 [ 1597.225584][T17044] ? aead_release+0x50/0x50 [ 1597.230064][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1597.239835][T17044] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1597.239850][T17044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1597.239871][T17044] ? security_socket_recvmsg+0x9b/0xd0 [ 1597.317858][T17044] ? aead_release+0x50/0x50 [ 1597.322346][T17044] sock_recvmsg+0xd0/0x110 [ 1597.326742][T17044] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1597.332440][T17044] ___sys_recvmsg+0x273/0x5d0 [ 1597.337120][T17044] ? ___sys_sendmsg+0x930/0x930 [ 1597.341951][T17044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1597.348176][T17044] ? kasan_check_read+0x11/0x20 [ 1597.353011][T17044] ? __fget+0x381/0x550 [ 1597.357149][T17044] ? ksys_dup3+0x3e0/0x3e0 [ 1597.361785][T17044] ? lock_downgrade+0x880/0x880 [ 1597.367144][T17044] ? __fget_light+0x1a9/0x230 [ 1597.371809][T17044] ? __fdget+0x1b/0x20 [ 1597.375861][T17044] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1597.382081][T17044] __sys_recvmsg+0x102/0x1d0 [ 1597.386680][T17044] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1597.391951][T17044] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1597.397390][T17044] ? do_syscall_64+0x26/0x610 [ 1597.402050][T17044] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1597.408093][T17044] ? do_syscall_64+0x26/0x610 [ 1597.412751][T17044] __x64_sys_recvmsg+0x78/0xb0 [ 1597.417495][T17044] do_syscall_64+0x103/0x610 [ 1597.422068][T17044] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1597.427937][T17044] RIP: 0033:0x457e29 [ 1597.431815][T17044] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1597.451398][T17044] RSP: 002b:00007f6a88447c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1597.459786][T17044] RAX: ffffffffffffffda RBX: 00007f6a88447c90 RCX: 0000000000457e29 [ 1597.467734][T17044] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 [ 1597.475683][T17044] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1597.483633][T17044] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a884486d4 [ 1597.491586][T17044] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 [ 1597.503435][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1597.509221][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1597.515087][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1597.522201][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1597.538254][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 22:06:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400]}, 0x48) [ 1597.545461][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1597.554619][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1597.561777][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1597.567183][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1597.576772][ C1] Buffer I/O error on dev loop0, logical block 0, async page read 22:07:00 executing program 0 (fault-call:8 fault-nth:47): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00]}, 0x48) [ 1597.622729][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1597.628709][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:07:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x1, 0x6}]}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) syz_open_pts(r0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) getsockname$unix(r1, &(0x7f0000000180), &(0x7f0000000040)=0x6e) 22:07:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) [ 1597.799356][T17181] FAULT_INJECTION: forcing a failure. [ 1597.799356][T17181] name failslab, interval 1, probability 0, space 0, times 0 [ 1597.827538][T17175] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode 22:07:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) syz_open_pts(r1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) write(r0, &(0x7f0000000180)="23b72a76a970a3e348b798d370ac0d984020f2d12e5958421ed5b3ff4050e8a528b920cc9583b9508667e583f93e54d0c5ab0db78a6b7175d2f99e6b61b9d62895de932e2609950f81d00b0837b4b5c192ed896c758dab0ee7cbe09b3bb6741d3458ae9342519ac38597c36000711e6689b6", 0x72) [ 1597.852038][T17175] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1597.866946][T17181] CPU: 1 PID: 17181 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1597.876078][T17181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1597.886132][T17181] Call Trace: [ 1597.889424][T17181] dump_stack+0x172/0x1f0 [ 1597.893753][T17181] should_fail.cold+0xa/0x15 [ 1597.898343][T17181] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1597.904240][T17181] ? ___might_sleep+0x163/0x280 [ 1597.909090][T17181] __should_failslab+0x121/0x190 [ 1597.914023][T17181] should_failslab+0x9/0x14 [ 1597.918520][T17181] __kmalloc+0x2dc/0x740 [ 1597.922759][T17181] ? af_alg_release+0x80/0x80 [ 1597.927425][T17181] ? kasan_check_write+0x14/0x20 [ 1597.932357][T17181] ? sock_kmalloc+0xc6/0x120 [ 1597.936953][T17181] sock_kmalloc+0xc6/0x120 [ 1597.941375][T17181] af_alg_alloc_areq+0x24/0x1e0 [ 1597.946227][T17181] aead_recvmsg+0x45d/0x1ab0 22:07:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000100)=""/23, 0x17}, {0x0}], 0x2}, 0x0) [ 1597.950841][T17181] ? aead_release+0x50/0x50 [ 1597.955345][T17181] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1597.960807][T17181] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1597.967050][T17181] ? security_socket_recvmsg+0x9b/0xd0 [ 1597.972508][T17181] ? aead_release+0x50/0x50 [ 1597.977009][T17181] sock_recvmsg+0xd0/0x110 [ 1597.981415][T17181] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1597.987125][T17181] ___sys_recvmsg+0x273/0x5d0 [ 1597.991799][T17181] ? ___sys_sendmsg+0x930/0x930 [ 1597.996650][T17181] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1598.002889][T17181] ? kasan_check_read+0x11/0x20 [ 1598.007737][T17181] ? __fget+0x381/0x550 [ 1598.011896][T17181] ? ksys_dup3+0x3e0/0x3e0 [ 1598.016307][T17181] ? lock_downgrade+0x880/0x880 [ 1598.021157][T17181] ? __fget_light+0x1a9/0x230 [ 1598.025837][T17181] ? __fdget+0x1b/0x20 [ 1598.029905][T17181] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1598.036141][T17181] __sys_recvmsg+0x102/0x1d0 [ 1598.040730][T17181] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1598.046023][T17181] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1598.051504][T17181] ? do_syscall_64+0x26/0x610 [ 1598.056176][T17181] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1598.062246][T17181] ? do_syscall_64+0x26/0x610 [ 1598.066927][T17181] __x64_sys_recvmsg+0x78/0xb0 [ 1598.071689][T17181] do_syscall_64+0x103/0x610 [ 1598.076278][T17181] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1598.082160][T17181] RIP: 0033:0x457e29 [ 1598.086047][T17181] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1598.105641][T17181] RSP: 002b:00007f6a88447c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1598.114046][T17181] RAX: ffffffffffffffda RBX: 00007f6a88447c90 RCX: 0000000000457e29 [ 1598.122006][T17181] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 [ 1598.129967][T17181] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1598.137949][T17181] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a884486d4 [ 1598.145911][T17181] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 22:07:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8500]}, 0x48) [ 1598.195831][T17175] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1598.207024][T17175] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:00 executing program 0 (fault-call:8 fault-nth:48): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeff]}, 0x48) 22:07:00 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1e4, 0x0) 22:07:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, 0x48) [ 1598.410639][T17305] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1598.442476][T17305] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f]}, 0x48) [ 1598.528381][T17305] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1598.560813][T17305] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1598.586554][T17323] FAULT_INJECTION: forcing a failure. [ 1598.586554][T17323] name failslab, interval 1, probability 0, space 0, times 0 [ 1598.600533][T17323] CPU: 0 PID: 17323 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1598.609646][T17323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1598.619794][T17323] Call Trace: [ 1598.623077][T17323] dump_stack+0x172/0x1f0 [ 1598.627414][T17323] should_fail.cold+0xa/0x15 [ 1598.632005][T17323] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1598.637798][T17323] ? ___might_sleep+0x163/0x280 [ 1598.642651][T17323] __should_failslab+0x121/0x190 [ 1598.647590][T17323] should_failslab+0x9/0x14 [ 1598.652081][T17323] __kmalloc+0x2dc/0x740 [ 1598.656327][T17323] ? af_alg_release+0x80/0x80 [ 1598.660993][T17323] ? kasan_check_write+0x14/0x20 [ 1598.665908][T17323] ? sock_kmalloc+0xc6/0x120 [ 1598.670493][T17323] sock_kmalloc+0xc6/0x120 [ 1598.674916][T17323] af_alg_alloc_areq+0x24/0x1e0 [ 1598.679765][T17323] aead_recvmsg+0x45d/0x1ab0 [ 1598.684371][T17323] ? aead_release+0x50/0x50 [ 1598.688875][T17323] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1598.694325][T17323] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1598.700557][T17323] ? security_socket_recvmsg+0x9b/0xd0 [ 1598.705997][T17323] ? aead_release+0x50/0x50 [ 1598.710499][T17323] sock_recvmsg+0xd0/0x110 [ 1598.714914][T17323] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1598.720632][T17323] ___sys_recvmsg+0x273/0x5d0 [ 1598.725303][T17323] ? ___sys_sendmsg+0x930/0x930 [ 1598.730134][T17323] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1598.736368][T17323] ? kasan_check_read+0x11/0x20 [ 1598.741206][T17323] ? __fget+0x381/0x550 [ 1598.745354][T17323] ? ksys_dup3+0x3e0/0x3e0 [ 1598.749757][T17323] ? lock_downgrade+0x880/0x880 [ 1598.754614][T17323] ? __fget_light+0x1a9/0x230 [ 1598.759283][T17323] ? __fdget+0x1b/0x20 [ 1598.763344][T17323] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1598.769593][T17323] __sys_recvmsg+0x102/0x1d0 [ 1598.774193][T17323] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1598.779492][T17323] ? trace_hardirqs_on_thunk+0x1a/0x1c 22:07:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000100)=""/23, 0x17}, {0x0}], 0x2}, 0x0) [ 1598.784955][T17323] ? do_syscall_64+0x26/0x610 [ 1598.789637][T17323] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1598.795707][T17323] ? do_syscall_64+0x26/0x610 [ 1598.800397][T17323] __x64_sys_recvmsg+0x78/0xb0 [ 1598.805176][T17323] do_syscall_64+0x103/0x610 [ 1598.809773][T17323] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1598.815649][T17323] RIP: 0033:0x457e29 [ 1598.819523][T17323] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1598.839107][T17323] RSP: 002b:00007f6a88447c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1598.847498][T17323] RAX: ffffffffffffffda RBX: 00007f6a88447c90 RCX: 0000000000457e29 [ 1598.855465][T17323] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 [ 1598.863431][T17323] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1598.871389][T17323] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a884486d4 [ 1598.879343][T17323] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 22:07:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe]}, 0x48) [ 1598.990215][T17334] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1599.003282][T17334] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) syz_open_pts(r0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) 22:07:01 executing program 0 (fault-call:8 fault-nth:49): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) [ 1599.068796][T17334] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1599.083628][T17334] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}, 0x48) 22:07:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000]}, 0x48) [ 1599.237255][T17356] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode 22:07:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) [ 1599.290760][T17356] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1599.350359][T17466] FAULT_INJECTION: forcing a failure. [ 1599.350359][T17466] name failslab, interval 1, probability 0, space 0, times 0 [ 1599.364353][T17466] CPU: 1 PID: 17466 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1599.373469][T17466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1599.383521][T17466] Call Trace: [ 1599.386810][T17466] dump_stack+0x172/0x1f0 [ 1599.391147][T17466] should_fail.cold+0xa/0x15 [ 1599.395733][T17466] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1599.401532][T17466] ? ___might_sleep+0x163/0x280 [ 1599.406379][T17466] __should_failslab+0x121/0x190 [ 1599.411310][T17466] should_failslab+0x9/0x14 [ 1599.415806][T17466] __kmalloc+0x2dc/0x740 [ 1599.420047][T17466] ? af_alg_release+0x80/0x80 [ 1599.424717][T17466] ? kasan_check_write+0x14/0x20 [ 1599.429644][T17466] ? sock_kmalloc+0xc6/0x120 [ 1599.434238][T17466] sock_kmalloc+0xc6/0x120 [ 1599.438649][T17466] af_alg_alloc_areq+0x24/0x1e0 [ 1599.443498][T17466] aead_recvmsg+0x45d/0x1ab0 22:07:01 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1e5, 0x0) [ 1599.448100][T17466] ? aead_release+0x50/0x50 [ 1599.452605][T17466] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1599.458064][T17466] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1599.464300][T17466] ? security_socket_recvmsg+0x9b/0xd0 [ 1599.469752][T17466] ? aead_release+0x50/0x50 [ 1599.474255][T17466] sock_recvmsg+0xd0/0x110 [ 1599.478670][T17466] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1599.484388][T17466] ___sys_recvmsg+0x273/0x5d0 [ 1599.489063][T17466] ? ___sys_sendmsg+0x930/0x930 [ 1599.493919][T17466] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1599.500157][T17466] ? kasan_check_read+0x11/0x20 [ 1599.505003][T17466] ? __fget+0x381/0x550 [ 1599.509159][T17466] ? ksys_dup3+0x3e0/0x3e0 [ 1599.513564][T17466] ? lock_downgrade+0x880/0x880 [ 1599.518417][T17466] ? __fget_light+0x1a9/0x230 [ 1599.523087][T17466] ? __fdget+0x1b/0x20 [ 1599.527154][T17466] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1599.533894][T17466] __sys_recvmsg+0x102/0x1d0 [ 1599.538481][T17466] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1599.543774][T17466] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1599.549225][T17466] ? do_syscall_64+0x26/0x610 [ 1599.553911][T17466] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1599.559971][T17466] ? do_syscall_64+0x26/0x610 [ 1599.564643][T17466] __x64_sys_recvmsg+0x78/0xb0 [ 1599.569400][T17466] do_syscall_64+0x103/0x610 [ 1599.573997][T17466] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1599.579879][T17466] RIP: 0033:0x457e29 [ 1599.583765][T17466] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1599.603359][T17466] RSP: 002b:00007f6a88447c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1599.611763][T17466] RAX: ffffffffffffffda RBX: 00007f6a88447c90 RCX: 0000000000457e29 [ 1599.619725][T17466] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 [ 1599.627689][T17466] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1599.635653][T17466] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a884486d4 [ 1599.643622][T17466] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 [ 1599.682911][T17356] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode 22:07:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000100)=""/23, 0x17}, {0x0}], 0x2}, 0x0) [ 1599.749997][T17356] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:02 executing program 0 (fault-call:8 fault-nth:50): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) 22:07:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x48) 22:07:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) fchdir(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) syz_open_pts(r0, 0x80) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b7, 0x5, 0x2, 0xfffffffffffff801, 0x1}, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180)=0x2, 0x4) [ 1600.015276][T17490] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1600.046387][T17490] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x48) [ 1600.119032][T17490] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1600.141484][T17490] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1600.147874][T17503] FAULT_INJECTION: forcing a failure. [ 1600.147874][T17503] name failslab, interval 1, probability 0, space 0, times 0 [ 1600.180729][T17503] CPU: 0 PID: 17503 Comm: syz-executor.0 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1600.189865][T17503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1600.199919][T17503] Call Trace: [ 1600.203213][T17503] dump_stack+0x172/0x1f0 [ 1600.207556][T17503] should_fail.cold+0xa/0x15 [ 1600.212150][T17503] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1600.217943][T17503] ? ___might_sleep+0x163/0x280 [ 1600.222796][T17503] __should_failslab+0x121/0x190 [ 1600.227729][T17503] should_failslab+0x9/0x14 [ 1600.232221][T17503] __kmalloc+0x2dc/0x740 [ 1600.236446][T17503] ? af_alg_release+0x80/0x80 [ 1600.241105][T17503] ? kasan_check_write+0x14/0x20 [ 1600.246024][T17503] ? sock_kmalloc+0xc6/0x120 [ 1600.250614][T17503] sock_kmalloc+0xc6/0x120 [ 1600.255014][T17503] af_alg_alloc_areq+0x24/0x1e0 [ 1600.259850][T17503] aead_recvmsg+0x45d/0x1ab0 [ 1600.264428][T17503] ? aead_release+0x50/0x50 [ 1600.268910][T17503] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1600.274347][T17503] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 22:07:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x48) [ 1600.280572][T17503] ? security_socket_recvmsg+0x9b/0xd0 [ 1600.286018][T17503] ? aead_release+0x50/0x50 [ 1600.290506][T17503] sock_recvmsg+0xd0/0x110 [ 1600.294911][T17503] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1600.300707][T17503] ___sys_recvmsg+0x273/0x5d0 [ 1600.305398][T17503] ? ___sys_sendmsg+0x930/0x930 [ 1600.310235][T17503] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1600.316462][T17503] ? kasan_check_read+0x11/0x20 [ 1600.321309][T17503] ? __fget+0x381/0x550 [ 1600.325458][T17503] ? ksys_dup3+0x3e0/0x3e0 [ 1600.329878][T17503] ? lock_downgrade+0x880/0x880 [ 1600.334723][T17503] ? __fget_light+0x1a9/0x230 [ 1600.339379][T17503] ? __fdget+0x1b/0x20 [ 1600.343427][T17503] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1600.349647][T17503] __sys_recvmsg+0x102/0x1d0 [ 1600.354229][T17503] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1600.359510][T17503] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1600.364946][T17503] ? do_syscall_64+0x26/0x610 [ 1600.369600][T17503] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1600.375656][T17503] ? do_syscall_64+0x26/0x610 [ 1600.380326][T17503] __x64_sys_recvmsg+0x78/0xb0 [ 1600.385073][T17503] do_syscall_64+0x103/0x610 [ 1600.389643][T17503] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1600.395522][T17503] RIP: 0033:0x457e29 [ 1600.399421][T17503] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1600.419014][T17503] RSP: 002b:00007f6a88447c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f 22:07:02 executing program 0 (fault-call:8 fault-nth:51): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) [ 1600.427406][T17503] RAX: ffffffffffffffda RBX: 00007f6a88447c90 RCX: 0000000000457e29 [ 1600.435358][T17503] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 [ 1600.443315][T17503] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1600.451280][T17503] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a884486d4 [ 1600.459248][T17503] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 22:07:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf01412cb9c97b64226b7cda8bd329636d6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x400}], 0x0, 0x0) 22:07:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x48) 22:07:03 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1e6, 0x0) 22:07:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) [ 1600.634047][T17623] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1600.644187][T17623] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x48) [ 1600.809324][T17623] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1600.819572][T17623] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100, 0x105000) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x3ff) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) syz_open_pts(r0, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f0000000140)={0x9, 0x10000, 0x2, 0x3, 0x1, 0x100}) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) pselect6(0x8, &(0x7f00000000c0), 0x0, &(0x7f0000000180)={0x1b7}, 0x0, 0x0) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f00000001c0)="3c76d9a3a171e254da3b399a0ab328a563514083a64333e115be485c94c43117829d2167d16d50008284cbfd31bb4021ccdaece50f200f809bea7f1e") 22:07:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}, 0x48) 22:07:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x48) 22:07:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18100000]}, 0x48) [ 1600.993252][T17724] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1601.003659][T17724] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20020000]}, 0x48) 22:07:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) [ 1601.087396][T17724] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1601.109171][T17724] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x48) [ 1601.352821][T17780] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1601.376813][T17780] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1601.440230][T17780] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1601.463040][T17780] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:04 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1e7, 0x0) 22:07:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x8, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}, 0x48) 22:07:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x80000000000000, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCCONS(r0, 0x541d) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f0000000240)=@abs={0x1, 0x0, 0x4e23}, 0x6e) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.impure\x00', &(0x7f00000001c0)=""/34, 0x22) syz_open_pts(r0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) r2 = accept4(r1, 0x0, &(0x7f0000000080), 0x80000) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x90, &(0x7f0000000300)=[@in6={0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}, @in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x1a}, 0x7}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x18}, 0x75200000000}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e22, 0x3, @empty, 0xfffffffffffff6aa}]}, &(0x7f0000000400)=0x10) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000440)={r3, 0x1}, 0x8) socket$can_bcm(0x1d, 0x2, 0x2) 22:07:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{0x0}], 0x1}, 0x0) 22:07:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000]}, 0x48) 22:07:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x10, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}, 0x48) [ 1601.875432][T18010] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1601.899284][T18010] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000]}, 0x48) [ 1601.966719][T18010] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1601.985277][T18010] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf0056bcb9c97b64226b7cda8bd329636d6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x400}], 0x0, 0x0) 22:07:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x258, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) [ 1602.174377][T18134] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1602.190255][T18134] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1602.206171][ C1] print_req_error: 478 callbacks suppressed [ 1602.206182][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1602.219287][ C1] buffer_io_error: 478 callbacks suppressed [ 1602.219296][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1602.241804][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1602.249074][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1602.263942][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1602.271080][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1602.279288][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1602.286443][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1602.309547][T18134] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1602.320652][T18134] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1602.329421][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1602.337340][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1602.351173][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1602.358332][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1602.371670][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1602.378824][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1602.391952][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1602.399108][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1602.412535][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 22:07:04 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1e8, 0x0) 22:07:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000]}, 0x48) 22:07:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf0056ecb9c97b64226b7cda8bd329636d6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x400}], 0x0, 0x0) [ 1602.419780][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1602.428038][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1602.435199][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1602.523654][T18328] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1602.560571][T18328] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1602.582812][ C0] net_ratelimit: 24 callbacks suppressed [ 1602.582820][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1602.594582][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:07:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x3, 0x800) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x44, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000180)={0x3444, 0xffffffff, 0x10000, 0x80000001, 0x12, 0x7, 0x8000, 0x5, 0x100000001, 0x1, 0x1, 0x1f}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) r2 = msgget$private(0x0, 0x4) msgrcv(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000001000"], 0x2b, 0x3, 0x2000) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000001c0)=0x800) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) syz_open_pts(r1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) 22:07:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000]}, 0x48) [ 1602.695477][T18328] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1602.726419][T18328] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{0x0}], 0x1}, 0x0) 22:07:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85000000]}, 0x48) 22:07:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff]}, 0x48) [ 1603.008375][T18362] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1603.037067][T18362] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95ffffff]}, 0x48) [ 1603.150547][T18362] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1603.177960][T18362] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) [ 1603.302696][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1603.302703][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1603.302742][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1603.308535][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1603.308620][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1603.331517][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1603.423205][T18482] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1603.445532][T18482] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1603.519920][T18482] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1603.539532][T18482] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x268, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff]}, 0x48) 22:07:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{0x0}], 0x1}, 0x0) 22:07:06 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1e9, 0x0) 22:07:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0xffffffffffff5fbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}) syz_open_pts(r0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) 22:07:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff]}, 0x48) [ 1603.782819][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1603.788636][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:07:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, 0x48) [ 1603.855279][T18626] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1603.869579][T18626] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f0000]}, 0x48) 22:07:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff85]}, 0x48) [ 1604.004700][T18640] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1604.021718][T18640] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1604.082339][T18640] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1604.093212][T18640] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff95]}, 0x48) 22:07:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x5802, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) [ 1604.329357][T18759] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1604.352207][T18759] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1604.402613][T18759] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1604.413198][T18759] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x6802, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:06 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1ea, 0x0) 22:07:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) syz_open_pts(r0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) 22:07:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff0]}, 0x48) 22:07:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:07 executing program 4 (fault-call:8 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x8000000, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) [ 1604.732510][T19090] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1604.743425][T19090] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, 0x48) [ 1604.787304][T19095] FAULT_INJECTION: forcing a failure. [ 1604.787304][T19095] name failslab, interval 1, probability 0, space 0, times 0 [ 1604.800214][T19095] CPU: 1 PID: 19095 Comm: syz-executor.4 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1604.809327][T19095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1604.819379][T19095] Call Trace: [ 1604.822683][T19095] dump_stack+0x172/0x1f0 [ 1604.827025][T19095] should_fail.cold+0xa/0x15 [ 1604.831620][T19095] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1604.837432][T19095] ? ___might_sleep+0x163/0x280 [ 1604.842280][T19095] __should_failslab+0x121/0x190 [ 1604.847219][T19095] should_failslab+0x9/0x14 [ 1604.851718][T19095] __kmalloc+0x2dc/0x740 [ 1604.855955][T19095] ? __local_bh_enable_ip+0x15a/0x270 [ 1604.861318][T19095] ? lock_sock_nested+0xe2/0x120 [ 1604.866253][T19095] ? __local_bh_enable_ip+0x15a/0x270 [ 1604.871622][T19095] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1604.876900][T19095] ? lock_sock_nested+0x9a/0x120 [ 1604.881832][T19095] ? sock_kmalloc+0xc6/0x120 [ 1604.886430][T19095] sock_kmalloc+0xc6/0x120 [ 1604.890855][T19095] af_alg_alloc_areq+0x24/0x1e0 [ 1604.895705][T19095] aead_recvmsg+0x45d/0x1ab0 [ 1604.900396][T19095] ? _copy_from_user+0xdd/0x150 [ 1604.905258][T19095] ? aead_release+0x50/0x50 [ 1604.909757][T19095] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1604.915208][T19095] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1604.921443][T19095] ? security_socket_recvmsg+0x9b/0xd0 [ 1604.926897][T19095] ? aead_release+0x50/0x50 [ 1604.931396][T19095] sock_recvmsg+0xd0/0x110 [ 1604.935809][T19095] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1604.941522][T19095] ___sys_recvmsg+0x273/0x5d0 [ 1604.946200][T19095] ? ___sys_sendmsg+0x930/0x930 [ 1604.951045][T19095] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1604.957286][T19095] ? kasan_check_read+0x11/0x20 [ 1604.962131][T19095] ? __fget+0x381/0x550 [ 1604.966289][T19095] ? ksys_dup3+0x3e0/0x3e0 [ 1604.970699][T19095] ? lock_downgrade+0x880/0x880 [ 1604.975551][T19095] ? __fget_light+0x1a9/0x230 [ 1604.980223][T19095] ? __fdget+0x1b/0x20 [ 1604.984284][T19095] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1604.990529][T19095] __sys_recvmsg+0x102/0x1d0 [ 1604.995115][T19095] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1605.000401][T19095] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1605.005855][T19095] ? do_syscall_64+0x26/0x610 [ 1605.010531][T19095] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1605.016589][T19095] ? do_syscall_64+0x26/0x610 [ 1605.021261][T19095] __x64_sys_recvmsg+0x78/0xb0 [ 1605.026025][T19095] do_syscall_64+0x103/0x610 [ 1605.030618][T19095] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1605.036510][T19095] RIP: 0033:0x457e29 [ 1605.040401][T19095] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1605.060000][T19095] RSP: 002b:00007f02f07abc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1605.068423][T19095] RAX: ffffffffffffffda RBX: 00007f02f07abc90 RCX: 0000000000457e29 [ 1605.076391][T19095] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 [ 1605.084356][T19095] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1605.092321][T19095] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f02f07ac6d4 [ 1605.100287][T19095] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 [ 1605.133607][T19090] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode 22:07:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x48) [ 1605.185191][T19090] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}, 0x48) [ 1605.334332][T19146] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1605.348459][T19146] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000]}, 0x48) 22:07:07 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1eb, 0x0) 22:07:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) [ 1605.456950][T19146] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1605.486435][T19146] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) syz_open_pts(r1, 0x1) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x400040) fremovexattr(r0, &(0x7f0000000180)=@known='trusted.syz\x00') 22:07:08 executing program 4 (fault-call:8 fault-nth:1): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) 22:07:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) [ 1605.723219][T19345] FAULT_INJECTION: forcing a failure. [ 1605.723219][T19345] name failslab, interval 1, probability 0, space 0, times 0 [ 1605.758969][T19345] CPU: 0 PID: 19345 Comm: syz-executor.4 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1605.768110][T19345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1605.778333][T19345] Call Trace: [ 1605.781619][T19345] dump_stack+0x172/0x1f0 [ 1605.785953][T19345] should_fail.cold+0xa/0x15 [ 1605.790558][T19345] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1605.796383][T19345] ? ___might_sleep+0x163/0x280 [ 1605.801246][T19345] __should_failslab+0x121/0x190 [ 1605.806177][T19345] should_failslab+0x9/0x14 [ 1605.810662][T19345] __kmalloc+0x2dc/0x740 [ 1605.814899][T19345] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1605.821128][T19345] ? af_alg_get_rsgl+0x4f8/0x6b0 [ 1605.826045][T19345] ? sock_kmalloc+0xc6/0x120 [ 1605.830624][T19345] sock_kmalloc+0xc6/0x120 [ 1605.835023][T19345] aead_recvmsg+0xc0e/0x1ab0 [ 1605.839607][T19345] ? aead_release+0x50/0x50 [ 1605.844091][T19345] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1605.849529][T19345] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1605.855759][T19345] ? security_socket_recvmsg+0x9b/0xd0 [ 1605.861214][T19345] ? aead_release+0x50/0x50 [ 1605.861233][T19345] sock_recvmsg+0xd0/0x110 [ 1605.861248][T19345] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1605.861263][T19345] ___sys_recvmsg+0x273/0x5d0 [ 1605.861284][T19345] ? ___sys_sendmsg+0x930/0x930 [ 1605.861298][T19345] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1605.861320][T19345] ? kasan_check_read+0x11/0x20 [ 1605.870206][T19345] ? __fget+0x381/0x550 [ 1605.870228][T19345] ? ksys_dup3+0x3e0/0x3e0 [ 1605.870242][T19345] ? lock_downgrade+0x880/0x880 [ 1605.870281][T19345] ? __fget_light+0x1a9/0x230 [ 1605.870300][T19345] ? __fdget+0x1b/0x20 [ 1605.880676][T19345] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1605.891723][T19345] __sys_recvmsg+0x102/0x1d0 [ 1605.929374][T19345] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1605.934649][T19345] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1605.940175][T19345] ? do_syscall_64+0x26/0x610 [ 1605.944834][T19345] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1605.950972][T19345] ? do_syscall_64+0x26/0x610 [ 1605.955632][T19345] __x64_sys_recvmsg+0x78/0xb0 [ 1605.960378][T19345] do_syscall_64+0x103/0x610 [ 1605.964950][T19345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1605.970821][T19345] RIP: 0033:0x457e29 [ 1605.974703][T19345] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1605.994287][T19345] RSP: 002b:00007f02f07abc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1606.002679][T19345] RAX: ffffffffffffffda RBX: 00007f02f07abc90 RCX: 0000000000457e29 [ 1606.010631][T19345] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 22:07:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x10000000, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x48) [ 1606.018670][T19345] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1606.026619][T19345] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f02f07ac6d4 [ 1606.034576][T19345] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 22:07:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x48) [ 1606.085649][T19350] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1606.101675][T19350] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x48) [ 1606.185736][T19350] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1606.202179][T19350] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf00512cb9c97b64226b7cda8bd6b9636d6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x400}], 0x0, 0x0) 22:07:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x48) 22:07:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x58020000, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:08 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1ec, 0x0) [ 1606.430846][T19576] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1606.472129][T19576] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1606.561773][T19576] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1606.577222][T19576] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) fcntl$getflags(r1, 0x3) syz_open_pts(r0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) 22:07:09 executing program 4 (fault-call:8 fault-nth:2): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x48) 22:07:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}, 0x48) [ 1606.730908][T19603] FAULT_INJECTION: forcing a failure. [ 1606.730908][T19603] name failslab, interval 1, probability 0, space 0, times 0 [ 1606.745013][T19603] CPU: 0 PID: 19603 Comm: syz-executor.4 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1606.754135][T19603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1606.764191][T19603] Call Trace: [ 1606.767480][T19603] dump_stack+0x172/0x1f0 [ 1606.767503][T19603] should_fail.cold+0xa/0x15 22:07:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x48) [ 1606.767531][T19603] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1606.767556][T19603] ? crypto_morus640_exit_tfm+0x10/0x10 [ 1606.787809][T19603] __should_failslab+0x121/0x190 [ 1606.792757][T19603] should_failslab+0x9/0x14 [ 1606.797279][T19603] __kmalloc+0x71/0x740 [ 1606.801437][T19603] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1606.806721][T19603] ? retint_kernel+0x2d/0x2d [ 1606.811316][T19603] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1606.816958][T19603] ? skcipher_walk_next+0x753/0x16b0 [ 1606.822250][T19603] skcipher_walk_next+0x753/0x16b0 [ 1606.822275][T19603] skcipher_walk_done+0x405/0xd00 [ 1606.832384][T19603] crypto_morus640_process_crypt.isra.0+0x13d/0x1b0 [ 1606.832405][T19603] ? crypto_morus640_decrypt_chunk+0xcc0/0xcc0 [ 1606.832439][T19603] ? crypto_morus640_update+0xd4/0xf0 [ 1606.850495][T19603] crypto_morus640_crypt+0x32f/0x720 [ 1606.855800][T19603] ? crypto_morus640_load+0x170/0x170 [ 1606.861164][T19603] ? scatterwalk_copychunks+0x6a0/0x6a0 [ 1606.866696][T19603] ? mark_held_locks+0xa4/0xf0 [ 1606.871443][T19603] ? trace_hardirqs_on+0x67/0x230 [ 1606.876459][T19603] crypto_morus640_decrypt+0x234/0x3c0 [ 1606.881899][T19603] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1606.888139][T19603] ? crypto_morus640_crypt+0x720/0x720 [ 1606.893596][T19603] aead_recvmsg+0x13f1/0x1ab0 [ 1606.898262][T19603] ? aead_release+0x50/0x50 [ 1606.902748][T19603] ? apparmor_socket_recvmsg+0x2a/0x30 [ 1606.908208][T19603] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1606.914427][T19603] ? security_socket_recvmsg+0x9b/0xd0 [ 1606.919866][T19603] ? aead_release+0x50/0x50 [ 1606.924352][T19603] sock_recvmsg+0xd0/0x110 [ 1606.928750][T19603] ? __sock_recv_ts_and_drops+0x590/0x590 [ 1606.934453][T19603] ___sys_recvmsg+0x273/0x5d0 [ 1606.939111][T19603] ? ___sys_sendmsg+0x930/0x930 [ 1606.943940][T19603] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1606.950162][T19603] ? kasan_check_read+0x11/0x20 [ 1606.954996][T19603] ? __fget+0x381/0x550 [ 1606.959132][T19603] ? ksys_dup3+0x3e0/0x3e0 [ 1606.963527][T19603] ? lock_downgrade+0x880/0x880 [ 1606.968360][T19603] ? __fget_light+0x1a9/0x230 [ 1606.973104][T19603] ? __fdget+0x1b/0x20 [ 1606.977154][T19603] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1606.983374][T19603] __sys_recvmsg+0x102/0x1d0 [ 1606.987944][T19603] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1606.993215][T19603] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1606.998652][T19603] ? do_syscall_64+0x26/0x610 [ 1607.003311][T19603] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1607.009357][T19603] ? do_syscall_64+0x26/0x610 [ 1607.014015][T19603] __x64_sys_recvmsg+0x78/0xb0 [ 1607.018764][T19603] do_syscall_64+0x103/0x610 [ 1607.023350][T19603] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1607.029217][T19603] RIP: 0033:0x457e29 [ 1607.033091][T19603] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1607.052673][T19603] RSP: 002b:00007f02f07abc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1607.061065][T19603] RAX: ffffffffffffffda RBX: 00007f02f07abc90 RCX: 0000000000457e29 [ 1607.069018][T19603] RDX: 0000000000000000 RSI: 0000000020000740 RDI: 0000000000000006 [ 1607.076970][T19603] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1607.084924][T19603] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f02f07ac6d4 [ 1607.092875][T19603] R13: 00000000004c4b48 R14: 00000000004d85c0 R15: 0000000000000007 [ 1607.121256][T19605] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1607.131638][T19605] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1810000000000000]}, 0x48) [ 1607.176634][T19605] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1607.187461][T19605] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:09 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1ed, 0x0) 22:07:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x68020000, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2002000000000000]}, 0x48) [ 1607.370963][T19826] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1607.393266][T19826] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:09 executing program 4 (fault-call:8 fault-nth:3): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) [ 1607.496682][T19826] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1607.534817][T19826] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xffffffffffff5fbf, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4000000000000}) syz_open_pts(r0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1bb}, 0x0, 0x0) 22:07:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x48) [ 1607.557440][ C0] print_req_error: 417 callbacks suppressed [ 1607.557462][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1607.570876][ C0] buffer_io_error: 417 callbacks suppressed [ 1607.570897][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1607.585234][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1607.592432][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1607.602197][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1607.609550][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1607.617859][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1607.625073][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1607.634050][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1607.641203][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1607.649624][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1607.656836][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1607.666071][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1607.673327][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1607.681514][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1607.688895][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1607.697055][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 22:07:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf00512cb9c97b64226b7cda8bd32960ad6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x400}], 0x0, 0x0) [ 1607.704227][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1607.712266][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1607.719640][ C0] Buffer I/O error on dev loop0, logical block 0, async page read 22:07:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x8dffffff, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}, 0x48) [ 1607.814600][T19960] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1607.829623][T19960] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000]}, 0x48) [ 1607.908070][T19960] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1607.925183][T19960] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000]}, 0x48) [ 1608.102707][ C1] net_ratelimit: 22 callbacks suppressed [ 1608.102716][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1608.102731][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1608.108514][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1608.126109][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1608.163999][T20062] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1608.174244][T20062] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:10 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1ee, 0x0) 22:07:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf00512cb9c97b64226b7cda8bd32962bd6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x400}], 0x0, 0x0) 22:07:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000]}, 0x48) 22:07:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) [ 1608.318729][T20196] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1608.330005][T20196] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1608.422389][T20196] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1608.449655][T20196] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:11 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x101000, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000180), &(0x7f00000001c0)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000640)) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xd0, r2, 0x18, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x81}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK={0x2c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x80}, 0x1) syz_open_pts(r1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000200)=""/190) 22:07:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000]}, 0x48) 22:07:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0xf0ffffff, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000]}, 0x48) [ 1608.700580][T20218] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1608.730569][T20218] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1608.790535][T20218] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1608.808033][T20218] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1608.822788][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1608.828744][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:07:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000]}, 0x48) 22:07:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0xffffff8d, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) [ 1609.049337][T20342] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1609.071419][T20342] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:11 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1ef, 0x0) 22:07:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8500000000000000]}, 0x48) [ 1609.155714][T20342] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1609.172599][T20342] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x2, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff00000000]}, 0x48) 22:07:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) syz_open_pts(r0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x200000, 0x0) ioctl$RTC_AIE_OFF(r1, 0x7002) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x1acb, 0x6000) ioctl$ASHMEM_GET_PIN_STATUS(r2, 0x7709, 0x0) 22:07:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0xfffffff0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95ffffff00000000]}, 0x48) [ 1609.542711][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1609.548554][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1609.552714][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1609.554385][ C1] protocol 88fb is buggy, dev hsr_slave_0 22:07:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff00000000]}, 0x48) [ 1609.610365][T20574] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1609.629748][T20574] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffffffffffff]}, 0x48) 22:07:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) [ 1609.722059][T20574] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1609.738416][T20574] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, 0x48) [ 1609.904048][T20687] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1609.914573][T20687] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1610.008043][T20687] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1610.026460][T20687] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f000000000000]}, 0x48) 22:07:12 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1f0, 0x0) 22:07:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x8, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf00512cb9c97b64226b7cda8bd329636d66b2dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x400}], 0x0, 0x0) [ 1610.226129][T20818] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1610.239660][T20818] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1610.296731][T20818] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1610.307466][T20818] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) syz_open_pts(r0, 0x0) 22:07:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x800000000000000, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x48) 22:07:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x40005, 0x0, &(0x7f0000000200)) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x12400) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000180)={0x7, {0x4, 0xec78, 0x8, 0xfffffffffffffffc}, {0x100000001, 0x400, 0x6, 0x7}, {0x0, 0x7}}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) syz_open_pts(r0, 0x0) pselect6(0x40, &(0x7f00000000c0)={0xe96, 0x0, 0x40000000}, 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) epoll_create(0x20) [ 1610.503762][T20835] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1610.525895][T20835] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe]}, 0x48) 22:07:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x2, 0x1) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=0x0, &(0x7f00000001c0)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000200)={r2, 0x1d, "40fdceee340631ada2beef1e3d169e500938d0d2c7d83ed0b80d39d61a"}, &(0x7f0000000240)=0x25) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) syz_open_pts(r0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) [ 1610.619055][T20835] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1610.642503][T20835] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x2}, 0x48) 22:07:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) [ 1610.853767][T20964] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1610.864139][T20964] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1610.931248][T20964] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1610.956988][T20964] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:13 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1f1, 0x0) 22:07:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0xf, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x3}, 0x48) 22:07:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x1000000000000000, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) [ 1611.110657][T21080] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1611.120835][T21080] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x4}, 0x48) [ 1611.161555][T21080] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1611.173181][T21080] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x5}, 0x48) [ 1611.281429][T21099] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1611.310754][T21099] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x6}, 0x48) [ 1611.399080][T21099] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1611.415633][T21099] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x100, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000180)={0x1f8, @time={0x77359400}, 0x687, {0x20, 0x6}, 0x5, 0x0, 0x3}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) syz_open_pts(r0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) 22:07:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x7}, 0x48) [ 1611.619468][T21224] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1611.634485][T21224] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1611.689301][T21224] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1611.713078][T21224] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:14 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1f2, 0x0) 22:07:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x10, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x5802000000000000, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x9}, 0x48) 22:07:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf00512cb9c97b64226b7cda8bd329636d6522dd47ee4fc6b9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x400}], 0x0, 0x0) [ 1611.991439][T21345] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1612.003364][T21345] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0xa}, 0x48) [ 1612.054397][T21345] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1612.067322][T21345] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf00512cb9c97b64226b7cda8bd329636d6522dd47ee4fc6e9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x400}], 0x0, 0x0) 22:07:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x48}, 0x48) [ 1612.221267][T21398] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1612.245039][T21398] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x4c}, 0x48) [ 1612.307022][T21398] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1612.336654][T21398] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80800, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) syz_open_pts(r0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) 22:07:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x68}, 0x48) 22:07:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x6802000000000000, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) [ 1612.683604][ C1] print_req_error: 539 callbacks suppressed [ 1612.683615][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1612.696773][ C1] buffer_io_error: 539 callbacks suppressed [ 1612.696789][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1612.714201][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1612.721376][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1612.729586][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1612.736731][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1612.745260][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1612.752418][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1612.760602][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1612.767812][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1612.775861][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 22:07:15 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1f3, 0x0) [ 1612.783032][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1612.791064][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1612.798431][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1612.807889][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1612.815065][ C1] Buffer I/O error on dev loop0, logical block 0, async page read 22:07:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0xf00, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x6c}, 0x48) 22:07:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x8dffffff00000000, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) [ 1612.836947][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1612.844144][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1612.852333][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1612.859515][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1612.922358][T21703] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1612.937977][T21703] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x74}, 0x48) [ 1612.978292][T21703] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1613.001490][T21703] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x7a}, 0x48) 22:07:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0xf0ffffff00000000, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) [ 1613.171916][T21824] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1613.186973][T21824] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1613.244442][T21824] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1613.269635][T21824] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:15 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffff5fbf}) syz_open_pts(r0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) 22:07:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x85}, 0x48) 22:07:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) [ 1613.457572][T21915] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1613.486087][T21915] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1613.589969][T21915] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1613.601040][T21915] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:16 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1f4, 0x0) 22:07:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x3f00, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0xfe}, 0x48) 22:07:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:16 executing program 2 (fault-call:5 fault-nth:0): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) [ 1613.702716][ C1] net_ratelimit: 20 callbacks suppressed [ 1613.702723][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1613.712713][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1613.714163][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1613.720002][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1613.725636][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1613.725678][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1613.770588][T22061] FAULT_INJECTION: forcing a failure. [ 1613.770588][T22061] name failslab, interval 1, probability 0, space 0, times 0 [ 1613.787928][T22061] CPU: 0 PID: 22061 Comm: syz-executor.2 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1613.797059][T22061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1613.797071][T22061] Call Trace: [ 1613.810412][T22061] dump_stack+0x172/0x1f0 [ 1613.814754][T22061] should_fail.cold+0xa/0x15 [ 1613.819350][T22061] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1613.825166][T22061] ? ___might_sleep+0x163/0x280 [ 1613.830030][T22061] __should_failslab+0x121/0x190 [ 1613.834982][T22061] should_failslab+0x9/0x14 [ 1613.839492][T22061] kmem_cache_alloc+0x2be/0x710 [ 1613.844343][T22061] ? kasan_check_write+0x14/0x20 [ 1613.849277][T22061] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1613.849300][T22061] getname_flags+0xd6/0x5b0 [ 1613.849318][T22061] do_rmdir+0xb8/0x420 [ 1613.849334][T22061] ? __ia32_sys_mkdir+0x80/0x80 [ 1613.849354][T22061] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1613.859437][T22061] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1613.859454][T22061] ? do_syscall_64+0x26/0x610 [ 1613.859471][T22061] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1613.859485][T22061] ? do_syscall_64+0x26/0x610 [ 1613.859498][T22061] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1613.859517][T22061] __x64_sys_rmdir+0x36/0x40 [ 1613.868413][T22061] do_syscall_64+0x103/0x610 [ 1613.868433][T22061] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1613.868445][T22061] RIP: 0033:0x457e29 [ 1613.868460][T22061] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1613.868466][T22061] RSP: 002b:00007fd47ec3ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000054 [ 1613.946882][T22061] RAX: ffffffffffffffda RBX: 00007fd47ec3ac90 RCX: 0000000000457e29 [ 1613.954851][T22061] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 1613.954862][T22061] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 22:07:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x220}, 0x48) [ 1613.954871][T22061] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd47ec3b6d4 [ 1613.954880][T22061] R13: 00000000004c4bae R14: 00000000004d86b0 R15: 0000000000000005 22:07:16 executing program 2 (fault-call:5 fault-nth:1): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 1614.031448][T22113] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1614.069025][T22113] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1614.096205][T22127] FAULT_INJECTION: forcing a failure. [ 1614.096205][T22127] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1614.109435][T22127] CPU: 1 PID: 22127 Comm: syz-executor.2 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1614.118544][T22127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1614.128602][T22127] Call Trace: [ 1614.131901][T22127] dump_stack+0x172/0x1f0 [ 1614.136251][T22127] should_fail.cold+0xa/0x15 [ 1614.140851][T22127] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1614.146684][T22127] should_fail_alloc_page+0x50/0x60 [ 1614.151891][T22127] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1614.157277][T22127] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1614.162997][T22127] ? find_held_lock+0x35/0x130 [ 1614.167771][T22127] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1614.173581][T22127] cache_grow_begin+0x9c/0x850 [ 1614.178343][T22127] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1614.184583][T22127] kmem_cache_alloc+0x645/0x710 [ 1614.189430][T22127] ? kasan_check_write+0x14/0x20 [ 1614.194363][T22127] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1614.199913][T22127] getname_flags+0xd6/0x5b0 [ 1614.204414][T22127] do_rmdir+0xb8/0x420 [ 1614.208483][T22127] ? __ia32_sys_mkdir+0x80/0x80 [ 1614.213329][T22127] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1614.218781][T22127] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1614.224230][T22127] ? do_syscall_64+0x26/0x610 [ 1614.228910][T22127] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1614.234973][T22127] ? do_syscall_64+0x26/0x610 [ 1614.239644][T22127] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1614.244932][T22127] __x64_sys_rmdir+0x36/0x40 [ 1614.249517][T22127] do_syscall_64+0x103/0x610 [ 1614.254105][T22127] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1614.259988][T22127] RIP: 0033:0x457e29 [ 1614.263878][T22127] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1614.283480][T22127] RSP: 002b:00007fd47ec3ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000054 22:07:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x300}, 0x48) [ 1614.291905][T22127] RAX: ffffffffffffffda RBX: 00007fd47ec3ac90 RCX: 0000000000457e29 [ 1614.299876][T22127] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 1614.307851][T22127] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1614.315813][T22127] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd47ec3b6d4 [ 1614.323776][T22127] R13: 00000000004c4bae R14: 00000000004d86b0 R15: 0000000000000005 22:07:16 executing program 2 (fault-call:5 fault-nth:2): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 1614.342708][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1614.348580][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1614.352715][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1614.360208][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1614.449530][T22113] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1614.471899][T22191] FAULT_INJECTION: forcing a failure. [ 1614.471899][T22191] name failslab, interval 1, probability 0, space 0, times 0 [ 1614.482667][T22113] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1614.486308][T22191] CPU: 1 PID: 22191 Comm: syz-executor.2 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1614.503936][T22191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1614.513991][T22191] Call Trace: [ 1614.517271][T22191] dump_stack+0x172/0x1f0 [ 1614.521589][T22191] should_fail.cold+0xa/0x15 [ 1614.526164][T22191] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1614.531956][T22191] ? ___might_sleep+0x163/0x280 [ 1614.536803][T22191] __should_failslab+0x121/0x190 [ 1614.541735][T22191] should_failslab+0x9/0x14 [ 1614.546218][T22191] kmem_cache_alloc+0x2be/0x710 [ 1614.551047][T22191] ? __d_lookup+0x433/0x760 [ 1614.555529][T22191] ? lookup_dcache+0x23/0x140 [ 1614.560183][T22191] ? d_lookup+0xf9/0x260 [ 1614.564408][T22191] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1614.569676][T22191] __d_alloc+0x2e/0x8c0 [ 1614.574000][T22191] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1614.579713][T22191] d_alloc+0x4d/0x2b0 [ 1614.583681][T22191] __lookup_hash+0xcd/0x190 [ 1614.588168][T22191] do_rmdir+0x281/0x420 [ 1614.592312][T22191] ? __ia32_sys_mkdir+0x80/0x80 [ 1614.597149][T22191] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1614.602591][T22191] ? do_syscall_64+0x26/0x610 [ 1614.607254][T22191] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1614.612526][T22191] __x64_sys_rmdir+0x36/0x40 [ 1614.617101][T22191] do_syscall_64+0x103/0x610 [ 1614.621678][T22191] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1614.627550][T22191] RIP: 0033:0x457e29 22:07:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x500}, 0x48) [ 1614.631426][T22191] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1614.651005][T22191] RSP: 002b:00007fd47ec3ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000054 [ 1614.659393][T22191] RAX: ffffffffffffffda RBX: 00007fd47ec3ac90 RCX: 0000000000457e29 [ 1614.667342][T22191] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 1614.675468][T22191] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1614.683420][T22191] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd47ec3b6d4 [ 1614.691369][T22191] R13: 00000000004c4bae R14: 00000000004d86b0 R15: 0000000000000005 22:07:17 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1f5, 0x0) 22:07:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x4000, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:17 executing program 2 (fault-call:5 fault-nth:3): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x600}, 0x48) [ 1614.914483][T22314] FAULT_INJECTION: forcing a failure. [ 1614.914483][T22314] name failslab, interval 1, probability 0, space 0, times 0 [ 1614.927791][T22314] CPU: 0 PID: 22314 Comm: syz-executor.2 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1614.936898][T22314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1614.936906][T22314] Call Trace: [ 1614.936928][T22314] dump_stack+0x172/0x1f0 [ 1614.936949][T22314] should_fail.cold+0xa/0x15 [ 1614.936967][T22314] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1614.936986][T22314] ? ___might_sleep+0x163/0x280 [ 1614.937005][T22314] __should_failslab+0x121/0x190 [ 1614.937029][T22314] should_failslab+0x9/0x14 [ 1614.969877][T22314] kmem_cache_alloc+0x2be/0x710 [ 1614.984123][T22314] ? find_held_lock+0x35/0x130 [ 1614.988949][T22314] ? tid_fd_mode+0x215/0x3f0 [ 1614.993592][T22314] ? proc_i_callback+0x30/0x30 [ 1614.998365][T22314] proc_alloc_inode+0x1c/0x1a0 [ 1615.003136][T22314] alloc_inode+0x66/0x190 [ 1615.007477][T22314] new_inode_pseudo+0x19/0xf0 [ 1615.012153][T22314] new_inode+0x1f/0x40 [ 1615.016226][T22314] proc_pid_make_inode+0x22/0x230 [ 1615.021261][T22314] proc_fd_instantiate+0x58/0x1f0 [ 1615.026293][T22314] proc_lookupfd_common+0x126/0x1c0 [ 1615.027301][T22312] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1615.031491][T22314] ? tid_fd_update_inode+0xf0/0xf0 [ 1615.031506][T22314] ? tid_fd_revalidate+0x230/0x230 [ 1615.031523][T22314] ? kasan_check_read+0x11/0x20 [ 1615.031586][T22314] ? do_raw_spin_unlock+0x57/0x270 [ 1615.031612][T22314] ? _raw_spin_unlock+0x2d/0x50 [ 1615.047087][T22312] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1615.051592][T22314] proc_lookupfd+0x25/0x30 [ 1615.051608][T22314] __lookup_hash+0x122/0x190 [ 1615.051626][T22314] do_rmdir+0x281/0x420 [ 1615.051649][T22314] ? __ia32_sys_mkdir+0x80/0x80 [ 1615.093884][T22314] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1615.099353][T22314] ? do_syscall_64+0x26/0x610 [ 1615.104043][T22314] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1615.109323][T22314] __x64_sys_rmdir+0x36/0x40 [ 1615.113919][T22314] do_syscall_64+0x103/0x610 [ 1615.118519][T22314] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1615.124405][T22314] RIP: 0033:0x457e29 [ 1615.128299][T22314] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1615.147912][T22314] RSP: 002b:00007fd47ec3ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000054 [ 1615.156322][T22314] RAX: ffffffffffffffda RBX: 00007fd47ec3ac90 RCX: 0000000000457e29 22:07:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x700}, 0x48) 22:07:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:17 executing program 2 (fault-call:5 fault-nth:4): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 1615.164281][T22314] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 1615.172241][T22314] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1615.180206][T22314] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd47ec3b6d4 [ 1615.188158][T22314] R13: 00000000004c4bae R14: 00000000004d86b0 R15: 0000000000000005 [ 1615.268617][T22312] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1615.274623][T22423] FAULT_INJECTION: forcing a failure. [ 1615.274623][T22423] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1615.291641][T22423] CPU: 0 PID: 22423 Comm: syz-executor.2 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1615.300745][T22423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1615.302499][T22312] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1615.310795][T22423] Call Trace: [ 1615.310827][T22423] dump_stack+0x172/0x1f0 [ 1615.310849][T22423] should_fail.cold+0xa/0x15 [ 1615.310868][T22423] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1615.310886][T22423] ? mark_held_locks+0xf0/0xf0 [ 1615.310911][T22423] should_fail_alloc_page+0x50/0x60 [ 1615.310926][T22423] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1615.310944][T22423] ? find_held_lock+0x35/0x130 [ 1615.358439][T22423] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1615.364411][T22423] cache_grow_begin+0x9c/0x850 [ 1615.369161][T22423] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1615.375385][T22423] kmem_cache_alloc+0x645/0x710 [ 1615.380218][T22423] ? find_held_lock+0x35/0x130 [ 1615.384965][T22423] ? proc_i_callback+0x30/0x30 [ 1615.389707][T22423] proc_alloc_inode+0x1c/0x1a0 [ 1615.394450][T22423] alloc_inode+0x66/0x190 [ 1615.398760][T22423] new_inode_pseudo+0x19/0xf0 [ 1615.403420][T22423] new_inode+0x1f/0x40 [ 1615.407468][T22423] proc_pid_make_inode+0x22/0x230 [ 1615.412486][T22423] proc_fd_instantiate+0x58/0x1f0 [ 1615.417494][T22423] proc_lookupfd_common+0x126/0x1c0 [ 1615.422672][T22423] ? tid_fd_update_inode+0xf0/0xf0 [ 1615.427760][T22423] ? tid_fd_revalidate+0x230/0x230 [ 1615.432849][T22423] ? kasan_check_read+0x11/0x20 [ 1615.437682][T22423] ? do_raw_spin_unlock+0x57/0x270 [ 1615.442776][T22423] ? _raw_spin_unlock+0x2d/0x50 [ 1615.447628][T22423] proc_lookupfd+0x25/0x30 [ 1615.452023][T22423] __lookup_hash+0x122/0x190 [ 1615.456596][T22423] do_rmdir+0x281/0x420 [ 1615.460735][T22423] ? __ia32_sys_mkdir+0x80/0x80 [ 1615.465574][T22423] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1615.471014][T22423] ? do_syscall_64+0x26/0x610 [ 1615.475671][T22423] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1615.480938][T22423] __x64_sys_rmdir+0x36/0x40 [ 1615.485507][T22423] do_syscall_64+0x103/0x610 [ 1615.490081][T22423] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1615.495959][T22423] RIP: 0033:0x457e29 [ 1615.499834][T22423] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1615.519415][T22423] RSP: 002b:00007fd47ec3ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000054 [ 1615.528060][T22423] RAX: ffffffffffffffda RBX: 00007fd47ec3ac90 RCX: 0000000000457e29 [ 1615.536011][T22423] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 1615.543963][T22423] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1615.551911][T22423] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd47ec3b6d4 [ 1615.559862][T22423] R13: 00000000004c4bae R14: 00000000004d86b0 R15: 0000000000000005 22:07:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x100000, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:18 executing program 2 (fault-call:5 fault-nth:5): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x900}, 0x48) 22:07:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:18 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1f6, 0x0) 22:07:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0xa00}, 0x48) 22:07:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x1018}, 0x48) 22:07:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x4) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f00000000c0)={{0x62, @loopback, 0x4e23, 0x4, 'lblcr\x00', 0x0, 0xed5, 0x3a}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x4e22, 0x3, 0x5, 0x2, 0x8}}, 0x44) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000000)={0x2, "a75f7b2e9dc7957ea7c026887f4734a7425f7d60ef2954e380b897617162fb27", 0x2, 0x1}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f00000005c0)={{0x1, 0x4, 0x1ff, 0x7fff, '\x00', 0x9}, 0x0, [0xfffffffffffffffc, 0x4, 0x1000, 0x5, 0x1000, 0x9, 0x0, 0x7, 0x8, 0x1f, 0x3f, 0xa77f, 0x8, 0x1, 0x8, 0x8, 0x5, 0x8000, 0x3f, 0x3f, 0x0, 0x8, 0x3, 0x6, 0x5, 0x2, 0xffffffffffffff00, 0x0, 0x8000, 0xffffffff, 0x7, 0x6, 0x1f, 0x1, 0x2, 0x9, 0x1000, 0xc00000000000000, 0x9, 0x8001, 0x1, 0x20, 0x3, 0x928, 0xfff, 0x1f80000, 0x6, 0x4, 0x6, 0x2df, 0x8, 0xff, 0x1000, 0x6, 0x3, 0x1ff, 0xffffffff, 0x10001, 0x4, 0x5, 0x100000000, 0x0, 0x0, 0x56, 0x3, 0x2, 0x1, 0x80000000, 0x4, 0x7fffffff, 0x5, 0xca, 0x64, 0x4, 0x2, 0x1000000000, 0x6, 0x5, 0x5, 0x39, 0x816, 0x6, 0xffffffff, 0x2, 0x3, 0x7, 0xfffffffffffffffa, 0x1, 0x2, 0x4, 0x5, 0x3, 0x400, 0x4, 0x4, 0xfff, 0x1, 0x57, 0x4, 0x7, 0x8, 0x4, 0x0, 0xffff, 0x4, 0x7, 0x9, 0x5, 0x800, 0x9, 0x6, 0xd84e, 0x7fffffff, 0x8, 0x1, 0x8, 0x41bf, 0x9, 0x0, 0x4, 0x4, 0x8, 0x0, 0x8, 0x8, 0x7, 0x3, 0xffffffff]}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 1615.921051][T22622] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1615.946963][T22622] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x1810}, 0x48) [ 1616.042594][T22622] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1616.078376][T22622] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x2000}, 0x48) 22:07:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') connect$nfc_llcp(r0, &(0x7f00000000c0)={0x27, 0x0, 0x1, 0x3, 0x400, 0x1000, "0c627af2e4a8710c7493752d54c432aed83474ed40572dc356ef041dc3e842ef1051e67585eb01b84ee90c12b195c78e0eadddf437b37fa1c84d6d24fae8e5", 0x3d}, 0x60) fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x1000000, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 1616.558673][T22690] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1616.576169][T22690] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1616.634639][T22690] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1616.645939][T22690] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:19 executing program 2: fchdir(0xffffffffffffffff) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000340)={0x8, "f3aa3468931061577f40752adc44f2b70e5e05258731dca4e27f53f6569cf7ea", 0x2, 0x4, 0x1000, 0x7f, 0x2, 0x3, 0x3, 0x1}) r0 = memfd_create(&(0x7f0000000300), 0x0) write(r0, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="39e4604d557cdbd2bb6ced9c73cc0ab784be8b9427e95cfaa5d10738be2ea3e06155b86744f9e1bfa70a8881b1030179f5e7243e0ec000fdfb4d20312d9661ab38d9b224dff45b4766badef8b7ca7de97837a83b5f7c5e30ea7f2be7c0d768e989", 0x61, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r1, 0xffffffffffff7fff, 0x6}, &(0x7f00000001c0)=ANY=[@ANYBLOB="656e633d72615920686173683d736d332d636500000000000000000000000000000000000000000000000008000000000000000000000000000000000010000000000000000000000000080000"], &(0x7f0000000240)="a24710829f34eacd0e49bf1a773a163309e5f675686845919c687c000bc8cae21ac2597a03a9b5ebc4296c75498fb93e9114708bdadaebf41e0ae5ad5d4330bc485c1157808361bd368f81bc2c52e0705a166a0685fdb21c610777e3753aaa4d1d0e4eed8541c973dfef97318942eeac51f19bbbc1901bd79376ad0fb1e3eac1ed9e80dbd0bd805ab0526a26a14e05a5fb973a7e937616dc2ebe0e7d3697d7566c5c5dfe13b6b76657b963bbcceb66d9a9d5d52c779ab12deb4dce4ca8a198b79589dbf4", &(0x7f00000005c0)="c4ecc5dab674d8eaaabedf9561cf9030dd4d85ce034b458ade3302c83704d6ab9a04144034504f3289427a5fc9147f699b220c2f9fdca12efacdd0cb16992f097bfd042edf1f24fd3d9cdc0f1386cc9bc4eddeffafd8f9a5ee6139fc30eafbcb9088dd6d8151d84434957003d249225258b99afebae527ce88b9e0ad64cbe73c65e602b257bad2d6a6e99c20440658b7d5ab76e6af808241e58d1dfeacf5964f9991e7f3789cc324b65fcfa3167c93eea76717a216d3518f5cd04bd9813dde5d512dad03871e753bb89a79300e3cb9c9eae5ccbdca2f99115b5e791cce7fafcc59b1001261bb8e8364ab9124f5b8d1ebcd595ce78f67b79a2fa3246fe2232a2556208602b399828dee24debf814fd34b351b826dce894b497e152e323a7a30ca143e9ada4bdf1d00f7cbd0769441bc5b6a26983b29904af504917b388e6cf4e0bf538a5028809c4939834f81cf181225f1a03b12efe01c204a5dcd09a5753204747711bdf40b205f5fcc59f0c7add3730338c43deadf81c3c3607d31da3a33abdd89fbe9e3991d1eefab571c3aaeccdf7075562ab21f779678edfa1fc078f026c51f6a905eea96b54bca849367153b27eb010ee8fe4166a63e78b849a7bf317fb2d1d48deca68c90207041d6b45b28d37c5c125b61cb4f328315abd1b1919e77ff7a6789e91d0f096b71c87fa1cb32cb2d6028e4879c65dba172fa7eaa368245cbbdf08d70d15564eb203ee030723e01b9cdce95b49783447b8da5b9903ed02efb8786a90f1d8ef045164fadc6b0900df9d34d1810e3b6746c5329cf894bf922b22389530714f7249fda66a7b0291d21cc0d21d7f8ca1953dfc35e43e8164cd711b77bf287c8cbc7de2af32fd936a50f51fa4515083995fe93629591f59d596e771778f88d39120b063ec0464559a4ceceeab89ac685c717ecc0766eb569b748dd74a33649d71cb43255fd0da58c13b413a41f1a69578f841684c6b47e62e1cbb0c96e8f39d7859b3caf7b8b92c9128a394ccf8e721474154a001ea5a29b978dba7f0e691533a2f61c2036efd70a487322766016096c5ff49689707575381bcb5d1554a1804bc01b3b701610fb3e2529ace2600760c261b13437fac01d0fd0902e67d056b42ad23cdef4beb3f64907bb13c84450d8a82eea4fbe321e2c757deabffae5aed39e661a1ffd771e875b36c77b0f0a19bbbfaf27c7c44949cbda4e7442520fd5707b570878bd83e093bc6281f294244a7bd2114adc0c5d2eaa0a01b94eecd491f4263a8dca64d829d3b1f8c3940f53a289d82f179c81774fb2393a6322593be11b62ce009a3b424686c88ea8e91987931666f76712005fa283d891882c256213268ab7ef5170748d6251d5e4047506586fbb9a49fbb9e056c6c575ef133536b2278f3364c0a11d58536f7b070310a9c1898dca1be31640f668c7300e938d06bf009f21aabf1b1dd88ab15f06cd6cfd52e2e7f2ff94f4b9bdd02cbdd7fa81704caded528121760dae1b45e24cec41c23221035d565289c56f4494c107357a512e6ee8b1995c183ed3ea5f41aa4be8de6d4b397a078c1a7c225509a002846c9c7bea10249b4706a479bb0adb074110e7c46df4bfd3951d77131e64ea5d09783d34670ac357602cb924df3a17fa8c9b05e574aa9aa7e0f3336275cdd4abe71e635bb781fccef103292778d05b0670433034ab34b6aec4f97f2a5dd29fa060640b0e5be12dd592063038d828e7e383723b6b4cbc884a51e6026a2bbbc04cfc7d6d949282c7a088bcff25b06a9443dacbcffc38eea71f24370fd3c20bb7597ca646f398a541fd70e124e6837c7c44b2b2a870169024382e85cf9b3a6b7c10d03cfc372968822eae107f4c87e2b7f724c90fe26122029c823f1bb04ab3d39ccbfbabd865c3fa797788799d798c08e37d96915b9acddd4823cc8db40b052b9fc09f895fb90c54b578a32b77607a324de5e474fd3d4bc258d242c6c1898b9b0a6e12669cef3f309ec753d06d5d261ffe264ec916dd95f41216924ae6995c25d6f5724ad883dbc5baa45812babdac944fbbf2371e1b67a8c4923b4cf401c7449e588019a0af033c2e6b47d913e6bf54923584ae86e06d2b09e2ef34da43d9e236d057032f91874953ae2a0fd51b247f555c4f20f76cc29a6322000bb25febcdb69d15aceb5f07ef425b677e959b50b4a172033a5d59900d53fdcf83a7be1405a86a15c5ceface7f75a9a31332ed104f8185d7956bf2c4b27ee78f674512fdd2cb2c5b7c36729586c33da0986f1fc5bbd6ad74bd346530dedd90b87fe264a99b9b71845591fbbc779c6440a517656b0cf80bbdf16c46ab0be8aa3160fba41e522cce553122ea90cde4cee0f0e2066bd7884c314488a04c9682278dc214011e2e5579787c37ff8e2f502a54653446db0770bfd4e09612fee351d4217a67c35eae18bc586d222f3f03efca36b508feddcf85af404586946fd6d14ce35af877d11d5d0b73b91591a4c48b359c1313155ad46ed2d53c77d92b2e2946e28c85a3efd06773c0abd77869918b674b278482bbf13efacd49581f16b5b33cda91db683bf114057d12963f87659f592e085ccfa6f8881aa580128a8318d15bab0d3eeead5d4bfef36b28eeb9643a3ae7b417afa640ac97fc58b42519b4abfb4d735a7ad71e377df36756daa62d4ebfb49e025ee1ee4e4d19f46c221ff5a62133dbdf83e27cdc3407f51bd4c9d9baf9297de8de5c1577f5de379244ed2c5024ea913b95d908a383f709aa4b9ac60e0ba12a3ca10902abeb0ad31705dcd7521db809713a717ac70f483399a266b45bf5ff99dae2f6ac93fd3055ab6ef198d63191f83e9499e83e9816dc34c6c50d9d251c50b71f97cf43acd48996ab85b7da1e8083ad6f3a31c9e11daec0539ee5d381599c4a31373f8b59aadfc73f212d24c6b33f294cc75a49be136ef95b5c4521fa15ee789abccd2799b304f3036a90488f8d084b36b1dcc8df1ed41199d4d6c7fb6b8128636e02ba9b1eebd8ea881d863a469a14027d5cddc144e7b8bc145c101279e30fab2e78913bb751c1e6e8fa2b1e425c5c17648a586312e7ef3aa1949e493566c8efd26302b3ca73e7df8747c149606e90e5b12741d27214a928cbb16af0bc5ab10050afb517412c6fda297856c68a838fe63ca4732f419ccfd37c783b93c2d06edc4669858500b57a45ae4f5e8c56fb3ef835227be82e53403b3bd567b72273feaa6c21346fdc9e7d815d48352be73152d54dec49bb290c8925dad6e22f83b4c98976aaf09dc1b3c0bf36f0b9f4fcc160a8df50fce3c7cc0e064211f85b7cbc3e071b4d098a039a0369312d9104550e654ab719d99a52c99597c7f6c6e5a3a01ea60a20af9d1c96ae3dc7fd1daa87f0241833d5767a46f664427c1484d262cb1cd0f4bb56ab0b9c07ce72c898eba4544b4b9d437e0e4d4d90484c875459269f2b020feca4fde32572725373ef4a567454764d1e61f61ef261a144c282a9fe781e36265dbf3e2a273ac3dc77acb86416d4891f882ca97f9707160778370b648ce270d48bf28c24adbeeec8239a6f6fa2535059229e8d7a1c8a431f6848870a3eda9a0ead185920c1972e688cf952485d09d7b20fa52b7986e917476b54d75524d35bd8f8d8538f401165fd2df39a38f5ee3b033eba39d15b56267391e6b98ed6a45655734d2c39723a009e19438a53ba50d8ef59e51f663760c877cf52ae540c2dfc19fbc6ad24e8751b4ea1154669511058d8d402cc4cdde94d229a7f7646d2215c57bf2e20590d358570a0db38118c17e42a3e796a1904f7631493c3aed91dee0719c4dc32134150fbd99417e16272d5dddfd8ccc3d2f5be46491b6e5bcc7fd7c27907b980e1f7dceabfcbfdc943127a9b93041f0325e2e34f1fed8a269b73c10301b1c4e4fa407def1033967a67c1a446fa2dee057413e86083676cd0d5379226b35bd5680062fb118be1b1a9f69b248bc24f808b6ec9e963dfd27db5acfa5e59876726e758e860138f9e32de5be50a10004b281aef5e148ede39c0b66aa6d235a589c3bbee4ca10476d21e3cb4cccfd979d05b7c7f7aae76d506d065fd5164bcf923c9c1bde4b9bd11adfa3ae0a7e27be962b7efbaad0e4ff130d199fb32da8603c972c4800c9c1f3edc8f7b38a77b00ac53a3f5ed6814789668fb57f45093323133c87d041c6e2891a69818bc3e67a621f25e2efba9d918f29f7abb828118e0fe8e76e8598032864467c5f64bf1970b97ef810076453958fe449d5f9460e26f57eab02b9f2db15517b8d82e7ae6be5f4680bf11318a89ca76648dbd1993c3b4329f2ad12ae7853bd373b1c34429aedf441551f45b62033fd30e8ab02115d14be9818daab2a88cc6da8c8be1cc81837ee2b410a67e5ffe688bc7aa976b3d55df9bf2d84cc8ae4dddb179a82f58bdf72b5743163dd77990c06cbf59297b8e66dd8791297b3e17a81603cf5819c3072917cb9f4f4347a6fb00296584505eb302ba74c1b64630cb130b7de5cb098eea6ddec4be034320d6330fb124951d52dcfed073fa80dc682868b391d9f34f114428828c16522fb464e5e5f7e454ed25ea3b81a1e79f821770c528ba07e6e30c93daf1b4005bc2c542cd5420c3dd0cc86c4defcac610db0eabcaa9f9d97cafecac440dadd154c92f9690c5e9db66b14b69eed82323b2d3538286625e8e46ef2fee71a28cff62fcc7e82dcf5741ce7e431bec27e6fe9533ec384cc30ad0d7cec29cb1644f0884b38d96f7acb464b326558e84852fa6980be6fc4e0f9b214112580f83500c89f74c5fb00ed0451e497e67eae4ab872dac179fd28a1ba11e6850c49f1a282d071c9745287b88e9808504132261b17ef286a72ca8b98b9f5b44df3569c303069cdca6a5455af1443e9b35b0601f13678879f190c1dba9e1d0604ae922b677a0cf760056169f3eb9613ef0a0760122a656d810136e22f792f21f3594076524e459d7592f26c0b6588ba0e216e619ddba27c4dbce62620c31b03f16b3436dfa436dbbfe4423246012f53071ff7fdf7640754e58e69ebf226b81f323f0b2100fca8152ad7d2c9b7802d949c97048cf6f3102e7bb7df96e72361c37196fdb26831767ff0c7825914a07a7306c2fa50b084eff3323e03fec0f658c932d0d14edcb05efb8ca956fc6c57428de5aa51cc3b6ef375b2233e5ece143f7e28da816c929c1d9220879a3115e292cce896595ea03aabbb2cf40d2ee56157462528596a043658f9805072b10455249f2af1d8b485ff5dee9a454f2220c6bed6df4f3a78c77577ec6506b208147683bf9dbd850ff3d09ca4bb518ff2da20e127a02f7ca8dccc1f59920b70e6e4b5c17427ee896c2d9e69a9f072543313d9c24942ecd84c5de9bbd6ae4b201721430c7cd91f2b113e0f4c44a2426add6b53a054442b627026b8c93a403bdcc83b606c06e180d2c34b2f76904691e4254557fe8bc555c4a39836f8cc4adfe4b4e8f3614280085bdcbf14927430eb843cf8a2384561c1873b2b8d9a3c963ba7105d5eacb3edf97fbec10efb7c30b4d1cd22553bb180e4916bf50b55134220a61b44323117525a9943daf27560c0e40c5671c2e01fa912617fa3a0b2e6e4065377ea2bbc89bb7e00a1cd0e9fd9a7f02553aac67945c4abfa1db54e8ed2a495463c3672bb46bd5dfd75313a504956523f53c2366d18cbe7bf3792d44266190dd9387172293168e24597b0cbf489dc5c8719a0ea7a1f678e7ac9ac975c241454c8034767b3859458fec972c6715affaa68dab53e49111b7b4a829b4b06bc4") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x2002}, 0x48) 22:07:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:19 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1f7, 0x0) 22:07:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r0, &(0x7f00000005c0)="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", 0x13e) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x3f00}, 0x48) [ 1616.853183][T22916] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode 22:07:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f00000000c0)="6963e64243eac86da39bce3deec6fc5ba9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 1616.896116][T22916] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1617.055314][T22916] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1617.077693][T22916] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x2000000, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x4800}, 0x48) 22:07:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') 22:07:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:19 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x42000, 0x0) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r1) r2 = memfd_create(&(0x7f0000000300), 0x0) write(r2, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x4c00}, 0x48) [ 1617.410142][T23045] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1617.422805][T23045] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1617.505009][T23045] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1617.521642][T23045] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:20 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1f8, 0x0) 22:07:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) 22:07:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x6800}, 0x48) 22:07:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) [ 1617.738818][T23277] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1617.764401][ C1] print_req_error: 478 callbacks suppressed [ 1617.764412][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1617.777538][ C1] buffer_io_error: 478 callbacks suppressed [ 1617.777548][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1617.788258][T23277] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1617.821526][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1617.828739][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1617.837469][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1617.844659][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1617.860379][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1617.867528][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1617.877491][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1617.884650][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1617.898025][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1617.905228][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1617.914185][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1617.921368][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1617.944909][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1617.945097][T23277] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1617.952078][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1617.956384][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1617.976944][T23277] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1617.976995][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1618.002724][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1618.009918][ C1] Buffer I/O error on dev loop0, logical block 0, async page read 22:07:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x8000000, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f00000003c0)='\xe0\x15\xe2\xd5t\xfd\xb3(\x98\xdbB\xa4\xa5\xb6\xac!\xc5\x9e\xf3[\xcf\t\x94}bT(\xa6f\xc6\x19\x15\xda[cp\xb6K\x92\f\xa8\x108\x8d0\xd7\xfc=\x015\xc6\x97\xe4\xab\xb4&w\x7fC\xb9a\xa8\b!\xbd\x9bp@\x0e\xf0N\xd3\xa4\xc9!N\x82\xee\xcaZ\xc4\f\x10tUEd\xe4\v\xef\x9b\xa1\xe0\x12\'', 0x2) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={0x0, 0x47aeee33}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000004c0)={r2, 0x10, &(0x7f0000000480)=[@in={0x2, 0x4e20, @local}]}, &(0x7f0000000500)=0x10) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18, 0x0, 0x1, {0x9}}, 0x18) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0x2) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x11, "2097a857dea84f64c84825db2a8a9b9a3f"}, &(0x7f0000000200)=0x19) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={0x0, 0x8001, 0x56, 0x7f, 0x3f, 0x1b09}, &(0x7f00000002c0)=0x14) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r3, 0x3}, &(0x7f0000000380)=0xfffffffffffffdb1) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000600)='/proc/capi/capi20ncci\x00', 0x400083, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={r4, 0x3}, &(0x7f0000000140)=0x8) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) 22:07:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x6c00}, 0x48) 22:07:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x7400}, 0x48) 22:07:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000140)="6963e64243ea486da3a74e3cee00fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b0000000000000000ff00200000f8bf56da33", 0xfffffffffffffecb) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) rmdir(&(0x7f0000000040)='./file0\x00') ioctl$KVM_S390_UCAS_MAP(r0, 0x4018ae50, &(0x7f0000000000)={0x1, 0x6, 0x8}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) getresuid(&(0x7f0000001300)=0x0, &(0x7f0000001340), &(0x7f0000001380)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000013c0)={{{@in=@multicast1, @in=@remote, 0x4e21, 0x7ff, 0x4e21, 0x2, 0x2, 0x0, 0x20, 0xff, r3, r4}, {0xe, 0x40000000, 0x3, 0x401, 0xffffffffffff6acb, 0x8, 0x3, 0x1}, {0xd23, 0x35c, 0x200, 0xffff}, 0x7, 0x6e6bbb, 0x1, 0x0, 0x2, 0x3}, {{@in=@empty, 0x4d4, 0x3c}, 0xa, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3504, 0x2, 0x3, 0x6, 0x20, 0x8, 0xe3}}, 0xe8) socket$rxrpc(0x21, 0x2, 0xffffffffffffffff) ioctl$int_in(r2, 0x5473, &(0x7f00000001c0)) [ 1618.236722][T23396] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1618.259970][T23396] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1618.360341][T23396] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1618.391112][T23396] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf00512cb9c97b64226b7cda8bd329636d6522dd47ee4fc2a9cbbb715eb27d66e03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x400}], 0x0, 0x0) 22:07:21 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1f9, 0x0) 22:07:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000100)=0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x7a00}, 0x48) 22:07:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000000), 0x0) write(r1, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x271) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 1618.634690][T23631] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1618.655790][T23631] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0xf000000, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x8500}, 0x48) 22:07:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5d0000000068f95d22467190ba406d59a5958d6f156c9c8a2ac4677b000000000000000000873a15c86302d19254", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000180)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, &(0x7f00000000c0)="0c9c4decec3a0289d6fa8692a00b157ffb32c6ea8e21ec11b20a2be8697acd9bf2807dfee702bf3e687c07f07c0021bdb2f23e12a1f6c141a586010822a6e4ca97925de84671b90adecf741489fc609ea5713c2a50482fbe74b81a764d367f7d53a7a088b848cda55339bdeb62a1df4eb34cd9be2b535c1fc195af0dcc73e8c2424e", 0x82) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=@delqdisc={0xa8, 0x25, 0x410, 0x70bd28, 0x25dfdbfc, {0x0, r2, {0xfff2, 0x9}, {0xfff2, 0xffff}, {0x1b, 0x3}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0x8}, @qdisc_kind_options=@q_multiq={{0xc, 0x1, 'multiq\x00'}, {0x8, 0x2, {0x5, 0xfff}}}, @qdisc_kind_options=@q_fq_codel={{0x10, 0x1, 'fq_codel\x00'}, {0x34, 0x2, [@TCA_FQ_CODEL_MEMORY_LIMIT={0x8, 0x9, 0x102b}, @TCA_FQ_CODEL_MEMORY_LIMIT={0x8, 0x9, 0x80000000}, @TCA_FQ_CODEL_QUANTUM={0x8, 0x6, 0x7fff}, @TCA_FQ_CODEL_DROP_BATCH_SIZE={0x8, 0x8, 0x3}, @TCA_FQ_CODEL_ECN={0x8, 0x4, 0x1}, @TCA_FQ_CODEL_QUANTUM={0x8, 0x6, 0xa6}]}}, @qdisc_kind_options=@q_cbs={{0x8, 0x1, 'cbs\x00'}, {0x1c, 0x2, @TCA_CBS_PARMS={0x18, 0x1, {0xd07, [], 0xc3, 0xdd7, 0x100000000, 0x6}}}}]}, 0xa8}, 0x1, 0x0, 0x0, 0x40000}, 0x40) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 1619.071250][T23656] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1619.085588][T23656] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0xfeff}, 0x48) 22:07:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) [ 1619.249844][T23676] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1619.261454][T23676] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1619.302801][ C0] net_ratelimit: 24 callbacks suppressed [ 1619.302810][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1619.314592][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1619.336592][T23676] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1619.351720][T23676] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:21 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1fa, 0x0) 22:07:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r1, 0x100, 0x70bd27, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x81) fchdir(r0) r2 = memfd_create(&(0x7f0000000300), 0x0) write(r2, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0xff00}, 0x48) 22:07:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) [ 1619.540106][T23894] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1619.550708][T23894] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1619.630089][T23894] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1619.658871][T23894] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x10000000, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0xff0f}, 0x48) 22:07:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) r2 = getpgid(0x0) ptrace$peek(0x1, r2, &(0x7f0000000240)) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x200}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={r3, 0x9}, 0xc) lsetxattr(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=@random={'os2.', 'fd\x00'}, &(0x7f00000001c0)='wlan1nodev\x00', 0xb, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 22:07:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) [ 1619.926311][T23916] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1619.942730][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1619.942751][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1619.948595][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1619.954467][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1619.960134][ C1] protocol 88fb is buggy, dev hsr_slave_0 22:07:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0xfffe}, 0x48) 22:07:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x2, 0x2) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f00000000c0)={0xc3, 0x0, [], {0x0, @bt={0x2, 0x1000, 0x1, 0x0, 0x0, 0x8000, 0x2, 0x7, 0x2, 0x6, 0x9, 0x1, 0x297, 0x9, 0x10, 0x20}}}) r2 = memfd_create(&(0x7f0000000300), 0x0) write(r2, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 1619.960179][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1619.976327][T23916] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1620.053192][T23916] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1620.080788][T23916] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') write$P9_RLERRORu(r0, &(0x7f00000000c0)={0x14, 0x7, 0x1, {{0x7, 'proc\\]['}, 0x8}}, 0x14) fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0xc) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:22 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1fb, 0x0) 22:07:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x40000}, 0x48) 22:07:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockname$packet(r0, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000780)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000900)={0x0, @multicast2, @multicast1}, &(0x7f0000000940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000980)={{{@in6=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000000a80)=0xe8) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000b00)={@rand_addr, 0x0}, &(0x7f0000000b40)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000d00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000b80)={0x12c, r2, 0xa01, 0x70bd2b, 0x25dfdbff, {}, [{{0x8, 0x1, r3}, {0x4}}, {{0x8, 0x1, r4}, {0x104, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}]}}]}, 0x12c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 1620.430993][T24154] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1620.464241][T24154] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1620.533914][T24154] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1620.555381][T24154] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1620.582706][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1620.582745][ C0] protocol 88fb is buggy, dev hsr_slave_0 22:07:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x3f000000, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x20000, 0x0) fchdir(r0) ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f0000000180)={0x7, 'syz0\x00'}) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000100)=""/122) openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x80400, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x10010, r2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x200000}, 0x48) 22:07:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x1000000}, 0x48) 22:07:23 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f00000002c0)={0x1, 0x9f4, &(0x7f00000000c0)="2f4c85fabde2cb385786eb88caa2ca3b5e51467e70f06fe429bfff0c0735cbf9800d534db81302330dc6a4aa2bb1b905432c8c5f0c596217634e38ca01abde1f002f525577d7268c213a5b09f56b1b93e2cbe5b7a70aeb1db330b2e71b9adbd8836b4fc37af52065c0e2a76bcce2fd87abef9c0803056a7053d945d95ba313eac7906d847845d2c14477bbc9014eee903ac6a1c647b8d48571e57c71bfce69a27656f3e0ee9b72551c15e694cdf770c5b3ca40532aec15cf02308c30c6299e0122dc6baac99ef43e6d58c09ac10d2da486afaae254f4638adb8b0b1bacb74b39", &(0x7f00000001c0)="fb257d83e9de3b013680350c3db3afe8b158a30488c0d32eb539032cf46c737ed5e59312e399599f8301f9cdfc418414b9d2014ca8744f62ecaeec1725173e10a8922aa278acf92b8c732f51f8abed5a670d15d4a4a0cf99bc01d5cb0ed5e35fd6312c39640fd30ec45eebd3a132361d2895312050849ff63c99b860f5d3e9e863c6351f1d522223c9e1cec82a40a69b05d8a37cbbf5c12d2b0951bf4193751a15f9864f3d425b5342f3a228345b5ec8cb2c633f6510a65dcc2aba882e44a6c071be0ddf6102e7d06d5202d03e5644886f", 0xe0, 0xd1}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000000)='./file0\x00', 0x52900, 0x10) [ 1620.774796][T24174] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1620.814027][T24174] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) r2 = semget$private(0x0, 0x4, 0x1) semtimedop(r2, &(0x7f0000000000)=[{0x3, 0x20200, 0x1000}, {0x2, 0x400, 0x1800}, {0x3, 0x5, 0x800}, {0x2, 0x1, 0x1000}, {0x2, 0x4, 0x1000}, {0x0, 0x41, 0x1000}], 0x6, &(0x7f00000000c0)) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 1620.922185][T24174] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1620.947882][T24174] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:23 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1fc, 0x0) 22:07:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x2000000}, 0x48) 22:07:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) ioctl$VIDIOC_G_JPEGCOMP(r0, 0x808c563d, &(0x7f00000002c0)) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000000)={0x206, r0}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0xc) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0\x00', 0x7f, 0x0, &(0x7f0000000200), 0x800000, &(0x7f0000000240)=ANY=[@ANYBLOB='data=writeback,discard,quota,ignore_locRl_fs,defcontext=user_u,smackfsroot=/,\x00']) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x11, r1, 0x0) connect$pptp(r0, &(0x7f00000000c0)={0x18, 0x2, {0x1, @remote}}, 0x1e) rmdir(&(0x7f0000000040)='./file0\x00') [ 1621.319985][T24411] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1621.332364][T24411] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1621.432976][T24411] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1621.448559][T24411] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x3000000}, 0x48) 22:07:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x40000000, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:24 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000040)={'veth1_to_bond\x00', 0x21c08c0d}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/current\x00') fchdir(r1) r2 = memfd_create(&(0x7f0000000300), 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_nanosleep(0x0, 0x0, &(0x7f00000000c0)={r3, r4+10000000}, &(0x7f0000000140)) write(r2, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) rmdir(&(0x7f0000000100)='./file0/file0\x00') 22:07:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x4000000}, 0x48) [ 1621.641449][T24436] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1621.652615][T24436] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x5000000}, 0x48) [ 1621.780000][T24451] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1621.790381][T24451] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1621.873326][T24451] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1621.891228][T24451] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:24 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1fd, 0x0) 22:07:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x6000000}, 0x48) 22:07:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x7000000}, 0x48) [ 1622.195581][T24669] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1622.215696][T24669] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1622.290833][T24669] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1622.323638][T24669] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x9000000}, 0x48) 22:07:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x10000000000000, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = memfd_create(&(0x7f0000000300), 0x0) write(r2, &(0x7f0000000140)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0xe5) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x8}) 22:07:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x0, 0x0) 22:07:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0xa000000}, 0x48) 22:07:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) r2 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x83, &(0x7f0000001200)={'nat\x00', 0x0, 0x0, 0x90, [], 0x0, &(0x7f00000001c0), &(0x7f0000000200)=""/4096}, &(0x7f0000001280)=0x108) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x18100000}, 0x48) [ 1622.573730][T24794] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1622.594613][T24794] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1622.699087][T24794] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1622.751510][T24794] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:25 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 22:07:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = accept4$unix(r0, &(0x7f0000000140)=@abs, &(0x7f00000001c0)=0x6e, 0x800) r2 = memfd_create(&(0x7f0000000300), 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f00000004c0)=0xe8) r7 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@multicast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000500)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f00000007c0)=0xe8) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r0, &(0x7f0000000a40)={0x90, 0x0, 0x5, {0x3, 0x0, 0x800, 0x40, 0x200, 0xe000000, {0x1, 0x3ff, 0x3, 0xfaa7, 0x1, 0x1b13, 0xffff, 0x6, 0x100, 0x6, 0x9, r6, r5, 0x4, 0xffffffff}}}, 0x90) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=r3, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="02000500", @ANYRES32=r6, @ANYBLOB="02000200", @ANYRES32=r7, @ANYBLOB="02000500", @ANYRES32=r8, @ANYBLOB="02000300", @ANYRES32=r9, @ANYBLOB="040004000000000008000000", @ANYRES32=r10, @ANYBLOB="08000400", @ANYRES32=r11, @ANYBLOB="10f34cfb07000000a8e295a24cb0942e"], 0x64, 0x1) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000a00)="f1269e960cc460ab915de3aada3a79e5", 0x10) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000000)=0x54) write(r2, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x20020000}, 0x48) 22:07:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x102, 0x400}], 0x0, 0x0) 22:07:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') fchmod(r0, 0xf55009b2bea8ceba) [ 1623.133246][T24937] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1623.151737][T24937] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1623.197723][T24937] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1623.218840][T24937] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r0, &(0x7f0000000140)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) fcntl$setlease(r1, 0x400, 0x1) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x15) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x3f000000}, 0x48) 22:07:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x103, 0x400}], 0x0, 0x0) 22:07:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x100000000000000, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') memfd_create(&(0x7f0000000000)='+vboxnet0\x00', 0x0) [ 1623.402192][T25062] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1623.408738][ C0] print_req_error: 478 callbacks suppressed [ 1623.408748][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1623.425506][ C0] buffer_io_error: 478 callbacks suppressed [ 1623.425514][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1623.453245][T25062] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1623.460433][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1623.470219][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1623.493622][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1623.500968][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1623.514061][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1623.521394][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1623.530563][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1623.537912][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1623.546320][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1623.553628][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1623.562222][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1623.569532][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1623.582918][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1623.590206][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1623.623772][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1623.631064][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1623.639283][T25062] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1623.648007][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1623.656428][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1623.656811][T25062] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:26 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x201, 0x0) 22:07:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x48000000}, 0x48) 22:07:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fsetxattr$security_evm(r0, &(0x7f0000000140)='security.evm\x00', &(0x7f0000000180)=@ng={0x4, 0x8, "9a7147ddec9d36ed91f4"}, 0xc, 0x1) open(&(0x7f00000001c0)='./file0\x00', 0x200000, 0x1e2) fchdir(r0) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000000000)={0x0, 0x3, 0x1}) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f00000000c0)="6963014243ea486da3a74e3deec6fc5bc1650b5de56946c568f95d22467190ba406d59a5958d6f156c9c882ac4677b00000000002000000000200000f8bfdca063a1440b0954da33", 0x343e8ded63caa5ad) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x4e23, 0x100000001, @mcast1, 0xe89}, {0xa, 0x4e24, 0x80000001, @loopback, 0x80000001}, 0xffffffff, [0xfffffffffffffff8, 0xfffffffffffffff8, 0x7f, 0x80000001, 0x7, 0x10001, 0x1f, 0x5d20000000000]}, 0x5c) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x104, 0x400}], 0x0, 0x0) 22:07:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) fsetxattr$security_ima(r0, &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000200)=@v1={0x2, "9c1e8415f8c6"}, 0x7, 0x1) r1 = memfd_create(&(0x7f0000000300), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000240)={0x100000001, 0xa2c5, 0x100000000, {0x0, 0x1c9c380}, 0x0, 0x7fffffff}) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, 0xfffffffffffffffd, 0xa83, 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4084a000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0x8, 0x70bd2a, 0x25dfdbfc, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8040}, 0x240008c0) rmdir(&(0x7f0000000040)='./file0\x00') [ 1623.950537][T25287] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1623.964101][T25287] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x4c000000}, 0x48) [ 1624.024715][T25287] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1624.067030][T25287] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x105, 0x400}], 0x0, 0x0) 22:07:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x68000000}, 0x48) 22:07:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x200000000000000, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000000), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000100)='net/igmp\x00') ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000000)={0x971e, 0x7}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000140)={r0}) [ 1624.248982][T25342] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode 22:07:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x6c000000}, 0x48) [ 1624.291568][T25342] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1624.364558][T25342] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1624.392394][T25342] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:27 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x202, 0x0) 22:07:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={0x0, r0, 0x0, 0x1}, 0x14) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000200)="6963e64243ea486d85a74e3deec6fc5bb9650b5de56946c568f95d2246a5b58d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33c58df2e3cf8abfd3307c793e0d6bc90c7506b2ae5c16c9406e837eb044e07f1540c037ff7ba01b470ec1d5c0", 0x14a) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f0000000100)={0xfffffffffffffffe, 0x6, 0x401, 0x7}) 22:07:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x74000000}, 0x48) 22:07:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf00512cb9c97b64226b7cda8bd329636d6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x106, 0x400}], 0x0, 0x0) 22:07:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) [ 1624.742711][ C1] net_ratelimit: 22 callbacks suppressed [ 1624.742720][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1624.752745][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1624.754171][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1624.760008][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1624.862346][T25549] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode 22:07:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x44, r1, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xfff}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x881) r2 = memfd_create(&(0x7f0000000300), 0x0) write(r0, &(0x7f0000000540)="6963f94243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') 22:07:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x7a000000}, 0x48) [ 1624.908446][T25549] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) mount$9p_xen(&(0x7f0000000000)='fd\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1000400, &(0x7f0000000340)={'trans=xen,', {[], [{@fsname={'fsname', 0x3d, 'fd\x00'}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+'}}, {@smackfsroot={'smackfsroot', 0x3d, 'fd\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '])security'}}, {@euid_lt={'euid<', r3}}]}}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') [ 1624.982349][T25549] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1624.992906][T25549] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x85000000}, 0x48) 22:07:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x800000000000000, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x107, 0x400}], 0x0, 0x0) [ 1625.234458][T25617] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1625.267428][T25617] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1625.320157][T25617] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1625.330640][T25617] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1625.542721][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1625.548741][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:07:28 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x203, 0x0) 22:07:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x85ffffff}, 0x48) 22:07:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x100010, r1, 0x0) fcntl$setsig(r0, 0xa, 0xc) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$NBD_DISCONNECT(r1, 0xab08) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x109, 0x400}], 0x0, 0x0) 22:07:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x8200) r2 = memfd_create(&(0x7f0000000280)='\x9e(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x24) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={r3, @in6={{0xa, 0x4e20, 0x353, @rand_addr="ab6ee84440bc7e5a8f665def20e33c63", 0x42355928}}, 0x81, 0x6, 0x6, 0x2, 0x2}, 0x10) rmdir(&(0x7f0000000040)='./file0\x00') [ 1625.753049][T25805] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1625.764337][T25805] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x95ffffff}, 0x48) 22:07:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp6\x00') connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {0x2, 0x6, 0xe56f, 0x9, 0x17, 0x10001}, 0x8000}, 0xe) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0xf0ffffff}, 0x48) [ 1625.879528][T25805] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1625.904402][T25805] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0xf00000000000000, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 22:07:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x10a, 0x400}], 0x0, 0x0) [ 1626.129278][T25870] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1626.147898][T25870] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1626.182785][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1626.188786][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1626.192769][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1626.200261][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1626.218834][T25870] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1626.229879][T25870] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:29 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x204, 0x0) 22:07:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0xfeffffff}, 0x48) 22:07:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip_vs\x00') fchdir(r0) r1 = memfd_create(&(0x7f00000000c0)='\x93\xf4\x97s\xf9t\x1a\x03+#\xce\xf5]\x87\xa9;c\xe8i\x90!\xaf1U\x97\xf70O\xb2\x95\xa4~\v\xd4H\x18s2\xe7\xde\xe3\xe3\xbe39b\xe9\xbb\xd9,\xb6\",\x00\x00\x00\xff\xff\xff\xf2\x00`b)\xaa\xa6t\xb8\xe8\xc8\x99\xe6\x1c\xeb\xf1\x82>\x11h\xc2\xec\xec\xb3\x89\xf1\xb2m.\x9eyqK\'', 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=""/81, 0x51) futex(&(0x7f0000000080)=0x1, 0x80, 0x2, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f0000000480)=0x2, 0x2) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) ioctl$CAPI_GET_FLAGS(r0, 0x80044323, &(0x7f0000000500)) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000004c0)=0x33, 0x8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x7f, 0x3, 0x15, 0x19, "5a61a4c993b573f10a601a9ec13c8bdb493f2b501d0433eae0992df6fd022d4e5f9f820021851f73ac636d8e3a9797b4815e33c48de0add012cd6893d129d3e1", "c5d7f372c1915b2387696e88a9e976d3c938fbf353564c7f12ab6ab350548506", [0x7735, 0x4]}) sendto$ax25(r0, &(0x7f00000001c0)="7e67133afec9704e4c9b16354f4a06b29ea2ac5890ec3f5c12371d52c0d373e19708aaef726882c3d29fb3ace8fd5e797a69bc877a19b17d9897112a04adb235d343db27de75da063e9826f18a12e5604d9f9b1201dec7090474b2cce3d543164a5f648f0724965495c374e715af5691abc99a4082be0d52a6ac6782cdd9e97134ae92eb4262a3935b6d952ff8ca1a327b672ba9fd77c167a842b6bdd821fa78ce34d5a598eafd5b17395ed51b8d644e418fe4f267c9961d2ccad92d8f4a8c0f1640c8e091250757f871b9645c1c98e7305684d728a0b35710a85f431f204dcdceb72257f594d62eb5cf8f92652eff6c401abdae", 0xf4, 0x20000000, &(0x7f00000002c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x6}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @null]}, 0x48) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x10f, 0x400}], 0x0, 0x0) [ 1626.601634][T26057] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1626.612087][T26057] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x102}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="90000000", @ANYRES16=r2, @ANYBLOB="00072abd7000fedbdf250a0020001400070008000000080002008b0a00002c0002000800010002000000080002000400000008000200000000000800020008000000dba025f7649efeaf47e463af280ffabb08000100f9ffffff3c000700080001000400000008000200faffffff0c00030005000000000000000c00030000000000000000000800020000000100080001000600000000000000"], 0x90}, 0x1, 0x0, 0x0, 0x4080}, 0x40) rmdir(&(0x7f0000000100)='./file0\x00') 22:07:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0xff000000}, 0x48) [ 1626.738242][T26057] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1626.755165][T26057] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x110, 0x400}], 0x0, 0x0) 22:07:29 executing program 2: r0 = socket(0x1, 0x80007, 0x9) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r1, 0x522, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffffff7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r2) r3 = memfd_create(&(0x7f0000000300), 0x0) write(r3, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r3, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x1000000000000000, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0xff0f0000}, 0x48) [ 1626.964854][T26192] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1626.975349][T26192] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1627.080205][T26192] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1627.103360][T26192] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:29 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x205, 0x0) 22:07:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) write$FUSE_LK(r0, &(0x7f00000000c0)={0x28, 0xfffffffffffffff5, 0x8, {{0x2, 0x2, 0x1, r2}}}, 0x28) 22:07:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0xffffff85}, 0x48) 22:07:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x114, 0x400}], 0x0, 0x0) 22:07:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x268}], 0x1}, 0x0) 22:07:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0xffffff95}, 0x48) 22:07:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0xa, 0x200, 0x80000001, 0x4, 0x0}, &(0x7f00000000c0)=0x10) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x9, 0x0, 0x9, 0x3, @broadcast}, 0x10) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000100)=ANY=[@ANYRES32=r2, @ANYBLOB="0600050003000700fe32a970bfdd"], &(0x7f0000000140)=0x12) [ 1627.543247][T26417] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1627.569262][T26417] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1627.652393][T26417] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1627.663315][T26417] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) poll(&(0x7f0000000000)=[{r0, 0x1000}, {r1, 0x1090}, {r1, 0x2100}, {r0, 0x10c2}, {r0, 0x2}, {r1, 0x200}], 0x6, 0x80) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0xfffffff0}, 0x48) 22:07:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x3f00000000000000, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x130, 0x400}], 0x0, 0x0) 22:07:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0xfffffffe}, 0x48) [ 1627.947185][T26525] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1627.957241][T26525] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1628.017567][T26525] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1628.034548][T26525] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:30 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x206, 0x0) 22:07:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000000)=0x5) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x1000000000000}, 0x48) 22:07:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x278}], 0x1}, 0x0) 22:07:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x163, 0x400}], 0x0, 0x0) 22:07:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000180)='fD ', 0x400000000000006) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xffffffffffffffff, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x4000000000000}, 0x48) [ 1628.464166][T26676] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1628.477968][T26676] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') rmdir(&(0x7f0000000000)='./file0\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000000), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 1628.558577][T26676] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1628.591106][T26676] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x4000000000000000, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x20000000000000}, 0x48) 22:07:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x16b, 0x400}], 0x0, 0x0) [ 1628.816647][T26808] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1628.833614][T26808] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1628.895348][ C1] print_req_error: 478 callbacks suppressed [ 1628.895359][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1628.908444][ C1] buffer_io_error: 478 callbacks suppressed [ 1628.908454][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1628.930281][T26808] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1628.944654][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1628.951816][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1628.956807][T26808] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1628.971416][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1628.978610][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1628.986686][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1628.993839][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1629.001840][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1629.008996][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1629.017045][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1629.024206][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1629.033562][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1629.040844][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1629.050824][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1629.057978][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1629.066138][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1629.073285][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1629.081360][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1629.088518][ C1] Buffer I/O error on dev loop0, logical block 0, async page read 22:07:31 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x207, 0x0) 22:07:31 executing program 2: gettid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f00000000c0)=0xc) r1 = syz_open_procfs(r0, &(0x7f0000000100)='fd\x00') fchdir(r1) r2 = memfd_create(&(0x7f0000000300), 0x0) write(r2, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x288}], 0x1}, 0x0) 22:07:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x100000000000000}, 0x48) 22:07:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x16e, 0x400}], 0x0, 0x0) 22:07:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={@remote, @loopback, @dev={0xfe, 0x80, [], 0x22}, 0x3, 0x1, 0x100000000, 0x400, 0x9, 0x200040, r1}) fchdir(r0) r2 = memfd_create(&(0x7f0000000300), 0x0) write(r2, &(0x7f0000000380)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_xen(&(0x7f0000000140)='team0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x20000, &(0x7f00000002c0)={'trans=xen,', {[{@mmap='mmap'}, {@cache_mmap='cache=mmap'}, {@cache_mmap='cache=mmap'}], [{@appraise='appraise'}, {@fsmagic={'fsmagic', 0x3d, 0x1}}, {@euid_eq={'euid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, 'mime_type'}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}}) 22:07:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x200000000000000}, 0x48) [ 1629.349766][T26929] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1629.377947][T26929] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@empty, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000000)=0xe8) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000200), 0x4) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={@loopback, 0x10, r2}) rmdir(&(0x7f0000000040)='./file0\x00') [ 1629.478117][T26929] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1629.503961][T26929] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x300000000000000}, 0x48) 22:07:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0xffffffff00000000, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x8010, &(0x7f0000000140)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@cachetag={'cachetag', 0x3d, 'posix_acl_accesslovboxnet0)!*'}}, {@version_9p2000='version=9p2000'}, {@access_any='access=any'}, {@cache_mmap='cache=mmap'}, {@version_L='version=9p2000.L'}, {@cache_mmap='cache=mmap'}]}}) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xffffffffffffffff, 0x11, r0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x3}], 0x0, 0x0) [ 1629.730539][T27066] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1629.809520][T27066] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:32 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x208, 0x0) 22:07:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x298}], 0x1}, 0x0) 22:07:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x100) 22:07:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x400000000000000}, 0x48) 22:07:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x4}], 0x0, 0x0) 22:07:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) tee(r0, r1, 0x8406, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000001c0)={&(0x7f00000000c0)=""/233, 0x10a000, 0x1000, 0xfffffffffffffffb}, 0x18) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000000)=0x14) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x500000000000000}, 0x48) [ 1630.241038][T27185] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1630.303466][T27185] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1630.342741][ C1] net_ratelimit: 20 callbacks suppressed 22:07:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x600000000000000}, 0x48) [ 1630.342749][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1630.342778][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1630.348534][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1630.348620][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1630.371514][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:07:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x5}], 0x0, 0x0) 22:07:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) socket$key(0xf, 0x3, 0x2) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') timerfd_gettime(r0, &(0x7f0000000000)) 22:07:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x700000000000000}, 0x48) [ 1630.488208][T27239] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1630.567556][T27239] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1630.982717][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1630.982722][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1630.982777][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1630.988524][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:07:33 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x209, 0x0) 22:07:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x900000000000000}, 0x48) 22:07:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x10}], 0x0, 0x0) 22:07:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.', 'posix_acl_access\x00'}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x2a8}], 0x1}, 0x0) 22:07:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000000c0)={0x65, 0x80000000, 0x1, 0x2, 0x1, [{0x5, 0x9, 0x5, 0x0, 0x0, 0x3108}]}) 22:07:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0xa00000000000000}, 0x48) [ 1631.093955][T27442] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x4) fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 1631.169867][T27442] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x1810000000000000}, 0x48) 22:07:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x6b}], 0x0, 0x0) 22:07:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000000)='fd\x00', 0x0) dup(r1) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f00000000c0), 0x4) [ 1631.441993][T27578] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1631.535028][T27578] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1631.782748][ C0] protocol 88fb is buggy, dev hsr_slave_0 22:07:34 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x20a, 0x0) 22:07:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x2002000000000000}, 0x48) 22:07:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x6) fchdir(r0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100), 0x4) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f00000000c0)={0x0, {0x3, 0x5}}) 22:07:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x2b8}], 0x1}, 0x0) 22:07:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x6e}], 0x0, 0x0) 22:07:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000000c0)=0x5, 0x4) r1 = memfd_create(&(0x7f0000000300), 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x1, 0x2) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000100)=0x1, 0x4) 22:07:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x3f00000000000000}, 0x48) [ 1631.963631][T27700] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1632.024063][T27700] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000000)={0x3, 0x10000}) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf00512cb9c97b64226b7cda8bd329636d6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x300}], 0x0, 0x0) 22:07:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x4800000000000000}, 0x48) 22:07:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2, 0x11, r0, 0x80000000000) rmdir(&(0x7f0000000040)='./file0\x00') [ 1632.225959][T27726] EXT4-fs (loop1): unable to read superblock [ 1632.306975][T27726] EXT4-fs (loop1): unable to read superblock 22:07:35 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x20b, 0x0) 22:07:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x4c00000000000000}, 0x48) 22:07:35 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000080)='fd\x00') fchdir(r1) r2 = memfd_create(&(0x7f0000000300), 0x0) write(r2, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000000)) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x402}], 0x0, 0x0) 22:07:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x2c8}], 0x1}, 0x0) 22:07:35 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x78, &(0x7f0000000100)=[@in={0x2, 0x4e20, @local}, @in={0x2, 0x4e23, @local}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e22, 0xfffffffffffffff9, @mcast2, 0x4}, @in6={0xa, 0x4e21, 0xffffffffffffffff, @local, 0x111}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x12}}]}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000200)={r1, 0x93, "e7ed56d537a61a0387d92eab6bfe625945fefe8c85f9b8fcbca9a9d1d18bda8ee8ba45ed969952561249f8c3bddba5fd882cce9843643a177c695ffc9ad22cbfb10af8f3060ebfbb81c694cace0c2fa8a5d9cffb6e7e56785c582cbe9d0282b0d036d2e142f1dc4b0f48b2e46cfa65317c60e0d44a9e138460bf8547b86ab69adfc64b34a81a3dc8d8f15913261bde0aa0b808"}, &(0x7f00000002c0)=0x9b) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r2) r3 = memfd_create(&(0x7f0000000300), 0x0) write(r3, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) write$P9_RRENAME(r2, &(0x7f0000000000)={0x7, 0x15, 0x1}, 0x7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r3, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x6800000000000000}, 0x48) [ 1632.843750][T27956] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) rmdir(&(0x7f0000000040)='./file0\x00') [ 1632.915954][T27956] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x6c00000000000000}, 0x48) 22:07:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x403}], 0x0, 0x0) 22:07:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') write(r0, &(0x7f00000000c0)="bb2fed3affaba4c86ecca37d5cdc0e4a6c5494205efdb20c45358c2f504b327cf2f07d8774c65521572aebb8394e590a3115aeecb888d522d0cbdbaa4d86daa1d83bbf1660861800844ece349230ecc628abc9725070c397a84f3da8ee2ec8ac2924d2c2eeff92f3a14718ed4b5a2c41fa7fc4078cefb2f0650e215ca4ab5f4f4b1ad5ce2b8d44dd5a82c52475543fe717d7d138668cebcfdb4e5d3542212f5b31866001cf13c49f463c35d3074a2d366a96d00736ce2766da9627602fc436a46186ebe6a243870fc80473f045e981725780c30d5a3c11cef48d", 0xda) [ 1633.202420][T28094] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1633.291659][T28094] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:36 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x20c, 0x0) 22:07:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x7400000000000000}, 0x48) 22:07:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x2d8}], 0x1}, 0x0) 22:07:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) r2 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="4ebcd0d987da7308a30e7ba9a2fde1ab39097166687865e5944380e99b37455eda9290e9f3a8a5c2e2b82e84c473b1d4", 0x30, 0xfffffffffffffffc) r3 = request_key(&(0x7f0000000140)='big_key\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='fd\x00', 0xfffffffffffffffa) keyctl$negate(0xd, r2, 0x9, r3) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x404}], 0x0, 0x0) 22:07:36 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x2, @local, 0x1}, r1}}, 0x30) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r2) r3 = memfd_create(&(0x7f0000000300), 0x0) write(r3, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) ioctl$FS_IOC_MEASURE_VERITY(r3, 0xc0046686, &(0x7f0000000180)={0x1, 0x7f, "28b2f6c0ca4fb776cdc2d6d0e0331a0c280a24af6c65df8498a5fb877e5fc60069ab6c6c111efae5ad67914a0ed98a588734930a0bae6530be44c47b72353180abd894b3e5297d33600a2fbcb82d1d16f882496186df3cd885a17986cb36e20f57205b1e6482a1e18e7a1a7a22e6d549f6ac3e1c128a87ecd08365a455e6a3"}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r3, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x7a00000000000000}, 0x48) [ 1633.714859][T28217] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000000)={0xffffffff80000000, 0x7, 0x7}) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f00000000c0)={0x4, "f9e1e12de6aa2b7aaaffb18fa5a49c6b4fa968c8b52e3297390c6d2eb0e60d76", 0x2, 0x1}) [ 1633.790838][T28217] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x405}], 0x0, 0x0) [ 1633.941560][T28240] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x8000000000000000}, 0x48) 22:07:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000140)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x9) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 1634.013980][T28240] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1634.232013][ C0] print_req_error: 356 callbacks suppressed [ 1634.232024][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1634.245410][ C0] buffer_io_error: 356 callbacks suppressed [ 1634.245419][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1634.260913][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1634.268246][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1634.276455][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1634.283775][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1634.291892][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1634.299098][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1634.312222][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1634.319370][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1634.332278][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1634.339422][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1634.352371][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1634.359520][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1634.372372][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1634.379520][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1634.392367][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1634.399522][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1634.412507][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1634.419653][ C1] Buffer I/O error on dev loop0, logical block 0, async page read 22:07:36 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x20d, 0x0) 22:07:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf00512cb9c97b64226b7cda8bd329636d6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x406}], 0x0, 0x0) 22:07:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x8500000000000000}, 0x48) 22:07:36 executing program 2: fchdir(0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000300), 0x0) write(r0, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xffffffffffffffff, 0x810, r0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x6, 0x802) 22:07:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x2e8}], 0x1}, 0x0) 22:07:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x85ffffff00000000}, 0x48) 22:07:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xffffffffffffffff, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 1634.588916][T28474] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1634.673440][T28474] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x407}], 0x0, 0x0) 22:07:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x33, "81bd6e1424944a60faacdd5940dab76f69ca2167bc3a798b3af9398bc2173f0d5019368bf4cc707f37471cfdd0a4fdf855db25"}, &(0x7f00000001c0)=0x57) fchdir(r0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000000)={0x9, &(0x7f00000000c0)=[{0xfffffffffffffff8, 0x0, 0xd8, 0xfffffffffffffffd}, {0x5, 0x2, 0x7, 0x1}, {0x0, 0x7, 0x40, 0x7fffffff}, {0xbab8, 0x0, 0x0, 0x9}, {0x9, 0x5, 0x7fffffff}, {0x3f, 0xcca5, 0x4, 0x5}, {0x6, 0xfffffffffffffffb, 0x5}, {0x0, 0x23, 0x3, 0x3}, {0x1, 0x5, 0xda, 0x1ff}]}, 0x10) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r0, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x11) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 1634.781700][T28518] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x95ffffff00000000}, 0x48) 22:07:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000840)={0x5, 0x1, 0xffffffffffff0000, 0xff, 0x3, 0x8}) r1 = memfd_create(&(0x7f0000000300), 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000880)={@multicast1, @multicast1, @empty}, 0xc) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@ipv4={[], [], @loopback}, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@empty}}, &(0x7f0000000200)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) r4 = getegid() lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0xa, &(0x7f0000000440)=[0xffffffffffffffff, 0xee01, 0x0, 0x0, 0xee01, 0xffffffffffffffff, 0x0, 0xee00, 0xffffffffffffffff, 0x0]) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x8, &(0x7f00000005c0)=[0x0, 0xee01, 0x0, 0xee01, 0xee00, 0xee00, 0xee01, 0xee00]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0, 0x0}, &(0x7f0000000640)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0, 0x0}, &(0x7f00000006c0)=0xc) getresgid(&(0x7f0000000700), &(0x7f0000000740)=0x0, &(0x7f0000000780)) r12 = getgid() lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f00000007c0)={{}, {0x1, 0x4}, [{0x2, 0x4, r2}, {0x2, 0x201ee0ec553ae9eb, r3}], {0x4, 0x4}, [{0x8, 0x4, r4}, {0x8, 0x6, r5}, {0x8, 0x2, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x8, 0x4, r9}, {0x8, 0x1, r10}, {0x8, 0x6, r11}, {0x8, 0x1, r12}], {}, {0x20, 0x3}}, 0x7c, 0x2) rmdir(&(0x7f0000000040)='./file0\x00') [ 1634.884819][T28518] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:37 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x20e, 0x0) 22:07:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x408}], 0x0, 0x0) 22:07:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x2f8}], 0x1}, 0x0) 22:07:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0xfffffe51) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0xf0ffffff00000000}, 0x48) 22:07:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0xfeffffffffffffff}, 0x48) [ 1635.471943][T28730] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1635.548728][T28730] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0xff00000000000000}, 0x48) 22:07:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x409}], 0x0, 0x0) [ 1635.711997][T28798] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x8, 0x0, 0x2, 0x400}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f00000000c0)={0x3, r2}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 1635.814281][T28798] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0xff0f000000000000}, 0x48) 22:07:38 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780)={0x0}, &(0x7f00000007c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) r1 = syz_open_procfs(r0, &(0x7f0000000080)='fd\x00') fchdir(r1) r2 = memfd_create(&(0x7f0000000300), 0x0) write(r2, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f00000000c0)='./file0\x00', 0x4, 0x7, &(0x7f0000000600)=[{&(0x7f0000000100)="18be3552b8c80b98b3af00d3b9d6b09d7d115ee1832e650890dcb4e8c0bff03a5451107a135f73b5ae52d0f8ead87cdf1c6b5cecada4dd66700444f174b712f72cd1e88f7b65db836f5c9185c96e491ff744e175ac14351c7ca741e514886d5f86", 0x61, 0x3}, {&(0x7f0000000180)="ab3ab94f22c4241e53cec7448313528a9e9b30623aeabb36c4ed07ad7ffaafefc78401a04094544ec521234914a9a0de377cad186e1cd959da164c86a46df052a05bfd2c24125671a146e7ab8e78efbf8f063ccf868725eecce7ceb31606823aff22b3e1f815c448e8d7bbfc6675880ea204a5b09e058ff20deb29a242d7bdd88dc9255f74ff842a1b1f1b3dd387206d14cc241924c94dc960716e5a2fc8939ea059a9bd5980bf18235ed3d58781ad1c742a73", 0xb3, 0xfff}, {&(0x7f0000000240)="34c189e706b3d77e8ff70c120f8343670146d3b898eb80508d7dcb6fbe0aaac2312d57a64651d90fdbb795b0eb62d025984a6620d7f705d5573a86f1d5b46f6085322b17b94dd85950e5fc778141db0d939c949e703d4286e699146cdf9cc1b69529de262e18439f359e4519e987f16dd9406ffd5d18217b63528d2ae9fd6b2b60d2cd5c1fbfdb3123d3955c846a5a2c3316658c1585881d2fa7aade9497807470188d7333acb5038403bdadec46e50bf5f1a972f040689b58ed9a0bb3c2839a7bddf0cb422f38c8516c1d8fff86407d5b09844c643ab6f099e9d02613ce58b8076373402f63afd100", 0xe9, 0x6}, {&(0x7f0000000340)="a3784fc41a6137194dec94aa5156a46b5bf775520774784a4566ddd8e330d8cd7fbf6257c4cd3da1d34cac70d8f4105ad1f32d57da4b6a2da5b9380955a85b85d9b5a94c0a2000e3ed2c19ad6e20b489eda3e31ad0d8cabfac07d704023496f28feb3bbcf46d369818411f50c891bcee6d075243f140362d5f627830d83c886f5b738f4e2b7309b856479672ead2166cd2", 0x91, 0x20}, {&(0x7f0000000400)="72846eca73183f96ee4a0460a4efb991331ca2799b8c15a1ca11c6ced4abe253c5fdad5cdc0488c2a32b0f630eefed403a829af4f46505a5e171f7f1e1a930ac3b602cd70b98431cbb2848ef47a6e42ac5f8a54c0de5ea4c5b24a76166db02ef5b716dfb79e630f62202466b3236592500f495c3436b9726b24fe7cd422f2f12347c820c530ae0e3051857ac251650d559eac30cd21aa53c97ef20ea2cb2a15876c890f431e4e2f2614123fe", 0xac, 0x3}, {&(0x7f00000004c0)="c4038a4d6c5449a6b3dd5963ac443c0b42f63c0a9bbf584544ff6583d28ff3e25e1dcab419d2416fcbecc58f25532fd40bf9bd3540bfeb2e7291c4aa2ad1363b82feba9cb21ad69f0582e46febf781d4bbf7aeb739d59bd660c4f426709e4738dd2bf94a6bada798dcb9f5d5b508b45d7e872f29aa403a4f0955bb", 0x7b, 0x8}, {&(0x7f00000005c0)="712d66e9d1435302448e335a24098b61cda5", 0x12, 0x2}], 0x10000, &(0x7f00000006c0)='keyring\x00') dup3(r1, r2, 0x80000) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) pwrite64(r1, &(0x7f0000000040)="892e23", 0x3, 0x0) rmdir(&(0x7f0000000880)='./file0\x00') add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) [ 1635.942745][ C0] net_ratelimit: 23 callbacks suppressed [ 1635.942754][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1635.954555][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:07:38 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x20f, 0x0) 22:07:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x40a}], 0x0, 0x0) 22:07:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x308}], 0x1}, 0x0) 22:07:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0xffffffff00000000}, 0x48) 22:07:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000000)={0x1, 0x0, 0x5, 0x800, 0x0, 0x2, 0x2}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') rmdir(&(0x7f0000000000)='./file0\x00') 22:07:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0xfffffffffffffffe}, 0x48) [ 1636.331812][T28989] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:38 executing program 2: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000000100)=').selflo\x00', 0xffffffffffffffff}, 0x30) r1 = syz_open_procfs(r0, &(0x7f0000000080)='fd\x00') fchdir(r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x5) write$P9_RLCREATE(r1, &(0x7f00000001c0)={0x18, 0xf, 0x1, {{0x20, 0x1, 0x1}, 0x800}}, 0x18) r2 = memfd_create(&(0x7f0000000300), 0x0) recvfrom$rose(r1, &(0x7f00000005c0)=""/4096, 0x1000, 0x40, &(0x7f0000000000)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x4, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x40) write(r2, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 1636.433556][T28989] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1636.582734][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1636.582750][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1636.588585][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1636.588671][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1636.594509][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1636.600093][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:07:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf00512cb9c97b64226b7cda8bd329636d6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x423}], 0x0, 0x0) 22:07:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x70) 22:07:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 1636.751165][T29129] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1636.822093][T29129] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:39 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x210, 0x0) 22:07:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x318}], 0x1}, 0x0) 22:07:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)=[&(0x7f00000000c0)='fd\x00', &(0x7f0000000100)='GPL\r\'securityselinuxself\x00', &(0x7f0000000140)='fd\x00', &(0x7f0000000180)='nodev,lo\x00', &(0x7f00000001c0)='systemppp1-\x00', &(0x7f0000000200)='fd\x00', &(0x7f0000000240)='&cgroup\x00', &(0x7f0000000280)='\x00', &(0x7f00000002c0)='fd\x00', &(0x7f0000000300)='vboxnet1\x00'], &(0x7f0000000480)=[&(0x7f00000003c0)='fd\x00', &(0x7f0000000400)='fd\x00', &(0x7f0000000440)='\x00']) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x20903048) 22:07:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf00512cb9c97b64226b7cda8bd329636d6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x42d}], 0x0, 0x0) 22:07:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008915, &(0x7f0000000180)="060000003c123f3188a070c16792637e19759751a589573802925a3dfa9cebb47c4564bd2da12ca585633199072948e34036c2d0c8c9efcc78ee1e26b2a82a0f82cb03499684a2d3b63c9f760875c8a5248654ee3f4e42661a06814ec50ff231880d633416e9c00281ef55350499413167288d768d3cb5667c0f8931e60b9f342291ed40e34457a60426e73fc31f34945abf0352e61b379ff4d9d82fe2e1d8bc6e4a26aa9fb23c3a8a50ebbf2cba4e74f50000fbfdbdedecb7e0748efe9ae70797a4a872ba59fd9acb72ed04268079bfa3058d3f19c20a6380aaa699b980e8abed82697862d3a18256930db7137576f9d3d1490d2ebc9c56") getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000000)={@multicast1, @loopback, 0x0}, &(0x7f0000000040)=0xc) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x3, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x2, 0x0, [], r1}, 0x48) [ 1637.216846][T29250] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1637.222732][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1637.223488][ C1] protocol 88fb is buggy, dev hsr_slave_0 22:07:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) ioctl$int_in(r0, 0x5473, &(0x7f0000000000)=0xbd2) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000140)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) setsockopt$llc_int(r0, 0x10c, 0x8, &(0x7f0000000000)=0x9, 0x4) syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0x6a, 0x2280) rmdir(&(0x7f0000000040)='./file0\x00') setrlimit(0xa, &(0x7f00000000c0)={0x8d, 0x2}) [ 1637.349165][T29250] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf00512cb9c97b64226b7cda8bd329636d6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x448}], 0x0, 0x0) 22:07:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000000)='\xca\t\x1e\xc0', 0x1000000000) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') 22:07:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 1637.584471][T29360] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1637.640009][T29360] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:40 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x211, 0x0) 22:07:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)=0x0) waitid(0x3, r1, &(0x7f0000000040), 0x1000000, &(0x7f0000000180)) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:07:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb965095de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000015000000000000200000f8bf54da33af08a4982e655a7d69a5872bc55b62b2df4ab6a35fe481e0d4e868574c7e7fbc710a23f8fa631e30675b01fa8196129c10cd8e129eefa3498f68feca8825f375323a83a5fe404373ec585557eaf9d06ed9bf5679b9d403edff14112b36229c444ed643dbc1a5428eb647c043098904cc909db54442c8c51316d2f823b64cbf202489f602374204dfea490344d3204ac0fe79cc7c6417283d303048f3d7ae80d55216c1cec8b8dd96d5a70e", 0xec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') set_tid_address(&(0x7f0000000000)) 22:07:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x44c}], 0x0, 0x0) 22:07:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x328}], 0x1}, 0x0) 22:07:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000000)={0x1, 0x0, 0x8}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x10c) 22:07:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=ANY=[@ANYBLOB="180000000000000000000000000000089500000000000000"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x22c) [ 1638.101227][T29511] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1638.188882][T29511] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1, 0x7, 0x9, 0x1, 0x5}) write(r1, &(0x7f00000001c0)="6963e64243ea486da3a74e3deec6fc0000000000000007c44ef95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x9) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) lstat(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0xa, &(0x7f0000000380)={[{@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x9}}], [{@dont_hash='dont_hash'}, {@obj_role={'obj_role', 0x3d, 'fd\x00'}}, {@appraise='appraise'}, {@subj_user={'subj_user', 0x3d, ',lo'}}, {@fowner_lt={'fowner<', r2}}]}) socket$inet6(0xa, 0x5, 0x8f0a) sendto$inet(r0, &(0x7f00000000c0)="22fd7d35a24758dbb86e0a4208a0b389243b597e9d7748937cc11938b6f1658397aedfabbe7ef7689f2099918a6cc8feb311bc2f54dce08e6d2790a13cbbb74d8f3f10e51f3269b34cb02a58d4fa4e5a7f0ae6fc1044a2d5cf12a2ead92d47b4d69c8a8cc69ca8882838deda6bca42c303b41a79fa104fc5fc5cf04e5398ca8494e2c99454323d59e8edd31fa7a31a9430c9e178ab65486cc01955d4c0420171b2e5e6b673", 0xa5, 0x0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) rmdir(&(0x7f0000000040)='./file0\x00') prctl$PR_SET_UNALIGN(0x6, 0x3) 22:07:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x460}], 0x0, 0x0) 22:07:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=ANY=[@ANYBLOB="18000000000000000000200800fe0e653800000000000000"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:07:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000140)='fd\x00', 0xeecfe914bc74ec4d) mbind(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, &(0x7f0000000000)=0x1, 0x200, 0x6) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000100)=0x9, &(0x7f0000000180)=0x4) [ 1638.413103][T29640] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1638.470301][T29640] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:41 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x212, 0x0) 22:07:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x338}], 0x1}, 0x0) 22:07:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x3, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800b, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:07:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f00000000c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, 0xc, 0x8, 0x6, [@bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @default]}) 22:07:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x468}], 0x0, 0x0) 22:07:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="18fff400000000008829d2c71fb00e77055045f5bb36b610b2c209000000009500"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 1638.939031][T29764] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r0, 0x0, 0x3, &(0x7f0000000000)='fd\x00', 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000100)={0xffffffffffffffc1}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') prctl$PR_SET_ENDIAN(0x14, 0x3) [ 1639.037260][T29764] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x46c}], 0x0, 0x0) 22:07:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x3, &(0x7f0000519fa8)=@framed, &(0x7f0000000000)='GPL\x00', 0x800a, 0xfffffea1, &(0x7f000062b000)=""/4096, 0x41100, 0x1}, 0x48) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 22:07:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000)=0x1e8f, 0x8) fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') [ 1639.323256][T29903] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1639.403251][T29903] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1639.444016][ C1] print_req_error: 356 callbacks suppressed [ 1639.444032][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1639.457230][ C1] buffer_io_error: 356 callbacks suppressed [ 1639.457240][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1639.481262][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1639.488435][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1639.501188][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1639.508342][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1639.516751][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1639.524003][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1639.532500][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1639.539657][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1639.547800][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1639.554961][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1639.562962][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1639.570304][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1639.578402][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1639.585583][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1639.593578][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1639.600711][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1639.608715][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1639.615873][ C1] Buffer I/O error on dev loop0, logical block 0, async page read 22:07:42 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x213, 0x0) 22:07:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x348}], 0x1}, 0x0) 22:07:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x0, r0}) write(r1, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 22:07:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x10100, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r1, 0xc0345642, &(0x7f0000000040)={0xe1c6, "5f279966b062dc1e9f34a2f40ab9aeb6eced0c183806953762f6491fdda1eee9", 0x2}) 22:07:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x474}], 0x0, 0x0) 22:07:42 executing program 2: r0 = userfaultfd(0x80000) poll(&(0x7f0000000100)=[{r0, 0x4001}], 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r1) r2 = memfd_create(&(0x7f0000000300), 0x0) write(r2, &(0x7f0000000540)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000000), &(0x7f00000000c0)=0x4) [ 1639.814949][T30019] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$bt_hidp(0x1f, 0x3, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000095008000000000004b3fbdf3af7bf1be4b64ce7e51f7bd6bba9646063c6bc162ef4387855c4a2da71fa6385d97088ccbcc5553e5429ba21ef9b9a56f2cf7137d60f7efad8d5141ef87f33bba66f9607e3819b8472eff8624eeb0b255ca472cc86f7d51f80a5c7a9d58a94c86c2b59cb71f13093f27cf7c54f036f95dafa8d1c1b7125a749e4771ae0a86f7efe2bfd0604d146e6e1aa33f5de3d96d70185dce09c74e25"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 1639.890993][T30019] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:42 executing program 2: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x206, 0x0) 22:07:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x47a}], 0x0, 0x0) 22:07:42 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80400, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000040)=@can={0x1d, 0x0}, &(0x7f00000000c0)=0x80) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000100)={r1, 0x21, 0x7, 0x9, 0x20, 0x1ff, 0xfffffffffffffff7}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x7, 0x0, [], [{0x5, 0xf9, 0x1, 0x2, 0xe00, 0x100}, {0x6b, 0x7, 0x0, 0x1, 0x2, 0x7}], [[], [], [], [], [], [], []]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:07:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x358}], 0x1}, 0x0) [ 1640.172225][T30153] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1640.231946][T30153] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:43 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x214, 0x0) 22:07:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) pipe(&(0x7f0000000180)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x20000, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x54) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x200000, 0x0) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) 22:07:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x500}], 0x0, 0x0) 22:07:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x368}], 0x1}, 0x0) 22:07:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x10080, 0x0) getpeername$netrom(r1, &(0x7f0000000040)={{0x3, @null}, [@null, @rose, @rose, @rose, @remote, @default, @remote, @bcast]}, &(0x7f00000000c0)=0x48) [ 1640.715464][T30372] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1640.781637][T30372] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:43 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x669, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socketpair(0x3, 0x0, 0x6, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x4, 0x9, 0xfff, 0x401, 0x8}, &(0x7f0000000480)=0x14) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000004c0)={r3, @in={{0x2, 0x4e23, @local}}}, &(0x7f0000000580)=0x84) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000100)=0x1000) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x81}, 0xc, &(0x7f0000000400)={&(0x7f00000001c0)={0x24, r4, 0x0, 0x70bd2d, 0x25dfdbfc, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x6}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000080}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc008240a, &(0x7f0000000200)='\'\xc4\'\v\xec\xe4\t\xc5r\x12-\x90\xda\x9a\x94\x02\xec\xea\x10\x90\x03\xcb\xf8\x1b6\xa5t\xd6\xd3\x93\xd3\xdf\x85P\x19G7Q\v\xdcHv\x03Qa\xf3\xd4\xfc(\x83\xfb\xf8C\xf6\xcd\xca\xb1\x90\xeb\'~\xa0\xd8\xc8\xe8\x94#\xcd\xd5Kp\xbf\xc0\x8d7\x1b?A(\xe8^\x9c\xff\x0f\x1ck\xbc\x95\x05\xcd\x17\xf7\x15o\xd4\xdc4\x84uw\xa6w\x0f\xea`1\xec\xb4\x04\xd5\r\x8d\xde\x1f]\x15\xe5\xe8\xd00\xe5\x8d\x9c\x9ec+\x02\x1d\xffa5\x94\xab\xddNe\xfe\x8c\xc4q\xbb\b\x91\xe5\xeb\x88\x1c\x0f\xb2.Tr\xe4\x99\x9e\xc0\x03\xb4\xd2\xf9KW\xce\xd1cC\xd5\xcf\x97\xa9\xeab\xda\xd6:\xa91q\xf7\xc5\xc0C\xd1\'\x89\xee\x84T:\x88x\xe2\x83\xf2r\xf4&t@\x9e\xa4qf\xdf\xf4\xb5\x01\\a\x85\xd3\xe0\xb7\n\xe7\xed\x84Q\xd7s\xcd4B\xcbQ\xa4\x9f[\x99\xdfJ%\xa8\xfc\xe3`\xc1\x0fy\x12\x181\xa5|8\xc8\xe7\x9f@\xeb:\nJA\xc9\xbc\xd4~}\xce\xe8\xfejH\x8fb\xdd\xbcJ\vk\'\xe7Q\xfd\xaaA`\xb5\xa1\xe4\xf8\x9eG\xcfb\xe8@\x04\xe1\xf8\xacU)(S\xed\xffA\xfaqt\xb6$e\n\xc7\x9b\xb0X\xb6\xd4\t\x99^^\xc2>J\x16\xd0\x8c\xecy*\xa0\a\xe9Ar\xa6\xb4n9j\xe5\xba\x8a\n\xce2\xcf_\x1b.t)\x8d09A[-\xf6\xe7\xe8\x1f\x92>\xb8\xd4>-\xacY\x9e\x88\x96\xa7\xfa\xdaoL\xa6\xec\xe8\xd5\xbfaf\xd7\xfc\x03\x91w)\xcd\x1f\xbe\xc9R\xcfz\x03\xec\br\x83\x8bM-\xf8X\xfd\x02\xb4RV\x7f\xda\xd3\xd4h\x1c\xdb\xbe\xa4U\xec\xcd\'\xbc\xd22\x85{,\xe6-,6\x9d\x85\xb4fL\b\x98\xe9@\xee\xc2.\xb3\xd6w\x10\x94\xb5%D\xe8\r\xfe\x98G\x82\fx,\xa2J\x12\x03ec\xd5e-\x1f6\xe7\xb6\xd9\xcf0J\xed\xb7\x9b\xfd\xfc\x00EQ\x1f') fcntl$getownex(r0, 0x10, &(0x7f00000005c0)) 22:07:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x600}], 0x0, 0x0) 22:07:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=ANY=[@ANYBLOB="55008f2f0000000000000000000000009500000000000000"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) name_to_handle_at(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0xf4, 0x9, "381db83416a7e25c493c16f22282538f56a4f675781b7c8d23c58340358f83c80e18a74d62ae4d678b351eed3c33f3934e7b1674ee76b18b166a20c6024a101516591ee2e113a4297f3b952d6403c051274244125d97e7721f5dfd3c391babfe61d4bb4eb73354188d0c75286b37ba4a01f06def6637570b0d7805a9cf9fe0c2230b317e29d15bc045afba57fb14ebc364004d1610969b14c709a513a307c9e0e9d395f37e285e848d5384922f1bf33af3179b7a75e86b6ecab71166455c819c82f06f97b22fc7ae8629cf81b79b3366079bca64ab29a5be9db9b257488fd29090bd30543f88322fae85ce17"}, &(0x7f0000000140), 0x1400) [ 1640.927856][T30465] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:43 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = dup2(r0, r0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x4000000) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000300), &(0x7f0000000340)=0x1) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000002c0)=@assoc_value, 0x8) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f00000003c0)={'syzkaller0\x00', 0x9}) fallocate(r1, 0x21, 0x6, 0x6) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000540)={0x0}, &(0x7f0000000400)=0x8) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getflags(0xffffffffffffffff, 0x408) fcntl$getownex(r0, 0x10, &(0x7f0000000580)) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000380)) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, &(0x7f0000000180)=0x979) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x810440, 0x0) modify_ldt$read_default(0x2, &(0x7f00000005c0)=""/184, 0xb8) umount2(&(0x7f0000000780)='./file0\x00', 0xfffffffffffffffc) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPCONNADD(r4, 0x400442c8, &(0x7f0000000680)=ANY=[@ANYBLOB="01f8ffff0900eb06ea82791b5b636d6f82d1f73f479ab07ed2e4637c5a302266f80faae1c0e9ca4902b264d022d31116299eeb921901aa38d16ab2a7de2d121980054e482bed01cb61c7a2d54e40000000baada39ae70580a0f5c012e6294b80b6deb9418c5a88fb8fb89643e6359f9a8bd4f285468a9515a6739430a917ff8ec65d5fa73d1e59967007b06549990ddc4e50864ab39d0ce53cd3bafa2c504eb40917e5479562c43b37436c3dff7b60aee907830e050010832a07036b2e0c86b11df510697234ffff363581d8000000000000000000000000"]) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x20, &(0x7f0000000300)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f00000004c0)=0x2, &(0x7f0000000500)=0x4) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000440)={r3, 0x5, 0x6, 0x8}, 0x10) 22:07:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x200000) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x4000, 0x1, 0xff, 0xa, 0x7f, 0xdd2}, &(0x7f0000000180)=0x20) 22:07:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x378}], 0x1}, 0x0) [ 1641.035042][T30465] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1641.177868][T30491] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 1641.289635][ T7597] minix_free_inode: bit 1 already cleared [ 1641.382722][ C1] net_ratelimit: 22 callbacks suppressed [ 1641.382729][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1641.382765][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1641.388587][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:07:43 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x215, 0x0) 22:07:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x700}], 0x0, 0x0) 22:07:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) r1 = open(&(0x7f0000000000)='./file0\x00', 0x240000, 0x26) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000040)={0x0, 0xd8f}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000000c0)={r2}, 0x8) 22:07:43 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = dup2(r0, r0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x4000000) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000300), &(0x7f0000000340)=0x1) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000002c0)=@assoc_value, 0x8) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f00000003c0)={'syzkaller0\x00', 0x9}) fallocate(r1, 0x21, 0x6, 0x6) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000540)={0x0}, &(0x7f0000000400)=0x8) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getflags(0xffffffffffffffff, 0x408) fcntl$getownex(r0, 0x10, &(0x7f0000000580)) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000380)) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, &(0x7f0000000180)=0x979) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x810440, 0x0) modify_ldt$read_default(0x2, &(0x7f00000005c0)=""/184, 0xb8) umount2(&(0x7f0000000780)='./file0\x00', 0xfffffffffffffffc) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)) ioctl$sock_bt_bnep_BNEPCONNADD(r4, 0x400442c8, &(0x7f0000000680)=ANY=[@ANYBLOB="01f8ffff0900eb06ea82791b5b636d6f82d1f73f479ab07ed2e4637c5a302266f80faae1c0e9ca4902b264d022d31116299eeb921901aa38d16ab2a7de2d121980054e482bed01cb61c7a2d54e40000000baada39ae70580a0f5c012e6294b80b6deb9418c5a88fb8fb89643e6359f9a8bd4f285468a9515a6739430a917ff8ec65d5fa73d1e59967007b06549990ddc4e50864ab39d0ce53cd3bafa2c504eb40917e5479562c43b37436c3dff7b60aee907830e050010832a07036b2e0c86b11df510697234ffff363581d8000000000000000000000000"]) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x20, &(0x7f0000000300)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f00000004c0)=0x2, &(0x7f0000000500)=0x4) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000440)={r3, 0x5, 0x6, 0x8}, 0x10) 22:07:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x388}], 0x1}, 0x0) [ 1641.565330][T30729] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = fcntl$dupfd(r0, 0x406, r0) bpf$PROG_LOAD(0x5, &(0x7f0000002180)={0x11, 0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000007000000000005f10080000065bafcfff0ffffff850000005d00000018000000070000000000000000000100181b0000", @ANYRES32=r1, @ANYBLOB="f7ff0000ffffffff95000000000000005ed99d78722a39523263255f2b8cf37993de2ab825b2f7c66af5e91052bf6fa0633abe8960f8e90cb058e99b488048375b49dfae56efeb81811e5ca108d0c56eb2721d585a7fa1fc641c4523691341d9a7effde797348e1a850f1135e4c72259d523220cc84f7fa84215ff1feab5d942e8281f85fd0d0b8914c8c916"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f0000001180)=""/4096, 0xffffffffffffffff}, 0x48) [ 1641.649241][T30729] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1641.665817][T30728] MINIX-fs: mounting unchecked file system, running fsck is recommended 22:07:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0xa00}], 0x0, 0x0) 22:07:44 executing program 2: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) nanosleep(&(0x7f0000000040)={r0, r1+10000000}, &(0x7f0000000080)) [ 1641.747502][ T7597] minix_free_inode: bit 1 already cleared 22:07:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200000, 0x28) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000280)={0x0, 0x7ff, 0xac, &(0x7f00000001c0)="d35b1ec4918d505707c7f604d0d19f16123e301ba1b68573f3891b64e1c6cf9c940584911db874d04ebe18e31480db70538bd3a8f5f9fae830eb6c9e12b782a306c06a653c52782a07efeeec3e02f261e0c713f30dc9108d4307170f6851c0132f2aa24849ca751fae4f3085753667d44aefd68ee02e762140060109f1a5186f3351467d06fe30e4bd9a0a0845e70bb3c59474bf191486e02bab170058bed555e4d361282153ddb5dfa21518"}) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000080)=@assoc_value, &(0x7f00000000c0)=0xffeb) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000100)=0x40, 0x4) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000180)) 22:07:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=ANY=[@ANYBLOB="580000000000000000000000000000009500000000000000"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7fff, 0x202) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffff9c, 0xc008640a, &(0x7f0000000040)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000080)={0x0, r2}) [ 1641.910848][T30852] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:07:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x398}], 0x1}, 0x0) [ 1641.975737][T30861] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1642.062218][T30861] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1642.182755][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1642.188696][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:07:44 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x216, 0x0) 22:07:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:07:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x1200}], 0x0, 0x0) 22:07:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x3a8}], 0x1}, 0x0) 22:07:44 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x5, 0x1) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x200, 0x0, 0x0, 0x6}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000080)={0x100000001, r1}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x2, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="1800f8ffffff0000208aeeae2c095dc732000003009500000000000000000000d46ea324655cbe72ccab4283b77c594a728eb1eba023a3352773829bd1a6159a7b5e46ba94b98f3ac89fb8d71a2a12b161da4160f07b89a2c7e5ad87d3a81c8b26a18913838a022632376df2f82a0597a25422f162ce23e5bd8ff3dbb3c63949a6354e14fe3f66ae3ce7c8564285246d40908a32fb4ab4cb22dc79c143314cbf31b3cf86224b49c26204b776d90a28777117b3faa01ace4b4b13e90a6814c6e2629dedacd0aaa975037eec402b90"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 1642.481582][T31086] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1642.544522][T31086] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f3188a070") 22:07:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x1400}], 0x0, 0x0) [ 1642.668072][T31138] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1642.728699][T30852] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 1642.729163][T31138] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:45 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f00000000c0), 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="e821d0023c123f3188a070") r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="240000004f0007021dfffd946f610500020000001f00000000000800080006000400ff7e", 0x24}], 0x1}, 0x0) 22:07:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000880)="0adc1f023c123f3188a070") sendmmsg(r0, &(0x7f0000000800)=[{{&(0x7f0000000000)=@ipx={0x4, 0x81, 0xff, "a1148df378c8", 0xf296}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000080)="eb78b1af78b5587384b56295776028521e350dd3e13b10422a45f124b5c1ed9b44d059ea892a1b57ce9a4568628534c387e9c386c82569e47d48215ae0c5f43f10b576c2945b8d18036ada977e10ef42c4b0f910396de86368521c3d50853fdf1aaa1be44baf800e099903d4cd47ddb309095d438f151359ffbe8442c8baca52c0365c4e3991a73c66941a960a63d7e8e4e2", 0x92}, {&(0x7f0000000180)="8036476d98cd0143f09f28", 0xb}, {&(0x7f00000001c0)="7e2de0ac5789f72eb7c53769369d65a54a513fe41d88e82e0f12f500486e9ae78c57b763722484af14109519ace80778264207b227ecf2f5fa97383c26d383556a0725d231db41d78eff3427199ef67cf6f0cacf7888d86a2b99f306b09966a62d89582430722f25b880a7036bfa3adf492a91ee8790047ae184b774449d0ff0118fbe13f6b35cfb0ed3d8161921cf29a0de0918ca83e5f80d9a53e6dad8b8a21b7ac066a8cd6fe7beb12259", 0xac}], 0x3, &(0x7f00000002c0)=[{0xb0, 0x0, 0xfffffffffffffff9, "0a4abb31c67c2d535aacfb9a4f0876bf7378f9c17aec50317fc70ec6c89e53930f96e6958b233470f5f0ef54b9ef390de490a077da93df78d95f333150ea1f1dbd3c9b44dbdd0d2787aed5593809a00977aceb9af57d8fe6c8d315fb6c88369566021e328ce0ebcab792cf6f508333e3db35d17a0ab2cb334b896a32f947cff9d6729ad123c112a09eb41f66228d0cc345e34c25303b981b4d"}, {0x18, 0x118, 0x0, "b213"}, {0x50, 0x11c, 0x0, "f549739833d63d2473736aca13388575bc9a9116649bf146a131de55f2a720ecd74234416530f64524f56c591f4bea48842b07f2343f8b94ca97eedb70"}, {0x78, 0x29, 0x8, "423f55ba12804bec96b544ddda79a111a1dd4de69efe3efa339dd967d34f0e8e6bee26e0412c2c8161133d92d4d7d95b9a1edc610d06b518435a6e7e4eaafd955ed56d9dda4a19d3d9d0b02c505674d36778369b2a829d2dad7f60f4d5ed479570123dac5447f1"}], 0x190}, 0x9}, {{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @multicast2}, 0x0, 0x4, 0x2, 0x1}}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000500)="ad5b7fb345b21d21d5fb8dffef8e4fb4e50c16eeddbac5fcfac24cb80c64b2b86d3950790714d912780ddf760a92b5ba9b91ab8f30ffefeb39b048f7227edaa952325dc412b8586b4e19329326d8ec2be446bf5a979f498a03282166cc", 0x5d}, {&(0x7f0000000580)="7203e67ba7fde2ff0f031da302197463b55f793ff8cec5cc8b72b285dfca00f3ef01af7ebd23a332ff296d52618082f66e773ae957e5decda261a282dc4fff04977b340dbb75b5e37465a1c2591ba109fe1d32", 0x53}, {&(0x7f0000000600)="25bdfc07a2dc8498fb3c2c3ff97955ac9fdd9c98b59e61c48ce8e9de46dc222947f4910b61462214bb69887806f39542e1a2a40fa9bde8026c9bc3d8414b6f5a196bd020a5bf67e2ab8d3e1c622690dfda64f82416bbe7319b17f8f2375cc16d3accf62e3496a0f906", 0x69}, {&(0x7f0000000680)="01947dc4829812f52ed5eea2cbb4d79fc53064d2cc6be2e85d63aaed6dea8c169c5e5a634a79556ca98fc61c544d4323561fd6b3570c8ab53bc0a0ea1ecf780977fbf2b3ecb34dc406ce524efe5b068665b0037b91d3569ddfa045c7b5bda1aba8edd82ca402f0fee61c4ff2038668ac9c409521bf9478a05a4ba85328a2e2", 0x7f}, {&(0x7f0000000700)="2bbd15d512c7570edbfb9aea4d1ba73bfff0b441783ffc909ecaca50e9d870d36295d167fd52c1b45cd08592f1711dd3f2f7bd40bbea7e549c9fbebf86c3461a2b30b7b3e3b7eca2734f951c7dc50bdaca6f9e7cc08170b7c49d1aaff5315790f56cef78403dbd7f0981b5845def", 0x6e}], 0x5}, 0x6}], 0x2, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:07:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x3b8}], 0x1}, 0x0) 22:07:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x6b00}], 0x0, 0x0) [ 1642.822723][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1642.822740][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1642.828525][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1642.828618][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1642.834494][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1642.950915][T31229] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1642.978663][T31233] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1642.990653][T31233] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1643.035720][T31229] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:45 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x217, 0x0) 22:07:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0edc1f023c123f3188a0707e0e6bffdbb054dfb29756b2163229a68c13721fc7035f5f283e3f27332d2308344f0ded34964f39e2efc445bd6ea07902a9c2d79bd2f4d42c0717b42b4ff09e03dc8ef855b5b7b0e7769a7c133304076b9457006dc4dc8e0ae13513ea33fa82514f4d3ad8ecc717deb239f5099b2a9c56b9c670aff9ed8c0dadab348024957f0ce9a1a1510d74") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) ioctl(r0, 0x6bc, &(0x7f0000000000)="94a0f0daf79629bd69283ddfd41e962d37c0ad9eff0afe5a15853ac8f172542c98b2d2c74f805212e16244cad365a719cc275878fa1b2aeb7fe31a421805bde2c457699f5e1be250da92cc2105ca6e4827dd35083692fc93b6407bfe9d99fb10358f9a5a55d7faffda23ef72a09e8e42e7ad4b4a") 22:07:45 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000080)={0xf911, 0xffffffff8be516ec, 0x2, {0x77359400}, 0x5, 0x6}) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000400)={@loopback, @remote, 0x0}, &(0x7f0000000440)=0xc) clock_gettime(0x0, &(0x7f00000004c0)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f00000005c0)={&(0x7f0000000480)={0x1d, r1}, 0x10, &(0x7f0000000580)={&(0x7f0000000500)={0x7, 0x4, 0x0, {r2, r3/1000+30000}, {0x0, 0x2710}, {0x2, 0x101, 0x659b, 0x2400000000}, 0x1, @can={{0x0, 0x9, 0x7fffffff}, 0x8, 0x2, 0x0, 0x0, "3b714c7ddd8c7264"}}, 0x48}, 0x1, 0x0, 0x0, 0x8004}, 0x20040010) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x8, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 22:07:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x6e00}], 0x0, 0x0) 22:07:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x3c8}], 0x1}, 0x0) 22:07:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=ANY=[@ANYBLOB="fbbdd1000000000000000000000008000000000000000000"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 1643.372851][T31458] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:45 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x54, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x40000018}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x4001fc, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000003c0)={0x53, 0xffffffffffffffff, 0x0, 0x0, @scatter={0x0, 0x29000, 0x0}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0}) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f0000000100)={0x28, 0x2, 0x0, {0x6, 0x9, 0x4a6}}, 0x28) [ 1643.468656][T31458] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0xd003}], 0x0, 0x0) 22:07:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = geteuid() getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000040), &(0x7f0000000080)) fchown(r0, r1, r2) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:07:46 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x2) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'security\x00'}, &(0x7f00000000c0)=0x54) r1 = memfd_create(&(0x7f0000000300)='/selinux/commit_pending_bools\x00', 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06w=\xea\x8f\xe2\xa4\xe3\x85!M\xeb&') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r1, r2, 0x0, 0x40000000009) [ 1643.602199][T31499] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1643.686261][T31499] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000040)="70f23f98bdd8a1e50f67ecab953c37416d4a5cc9bc25f078df790fe6466250fa17c2e96bd46b4365f716609d9405fa2896dd05028071068f559453e59acacbb64661243627c65fd0", &(0x7f0000000180)=""/4096}, 0x18) 22:07:46 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x218, 0x0) 22:07:46 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xe) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3f}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 22:07:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x21c0200}], 0x0, 0x0) 22:07:46 executing program 3: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="f13cfaba0dcb82273d409877129e97ae53e12b5c961c5b9d3a59e669c1c489f40c6ef76139ee45e04ba3e3ee4d33b679d5406a64caf353ba814bdbb310bb4d83733f3d41b7f9e68bbf757b7affca5991ba7987c25c967ca04e229620a04e534fcadbee6aa10bb89fff36c58de6ac1275e548f018cd7403caf36642a15e340d24dee60add44f1289f230971c26464b458", 0x90, 0xfffffffffffffffa) r1 = add_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, r0, 0x8001, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$vivid(&(0x7f0000000200)='/dev/video#\x00', 0x1, 0x2) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xb, 0x3, &(0x7f0000519fa8)=ANY=[@ANYBLOB="df86d6d6c30db05b00000001"], &(0x7f00005fc000)='GPL\x00', 0x5, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x1}, 0xfffffffffffffd71) 22:07:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x3d8}], 0x1}, 0x0) [ 1644.243702][T31714] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ubi_ctrl\x00', 0x440100, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f00000003c0)={0x7, 0x100000001, 0x0, 0x6, 0x0, 0x4, 0x1}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x800, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000080)={@mcast2, @mcast1, @local, 0xffffffff00000000, 0x1, 0x3, 0x500, 0x93, 0x1, r3}) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r2, &(0x7f0000000480)="1e12427eeb12c3688295dd5c92876fe36d394383f529c997e99e8d70ea330f6ae80e311a3356170e8651ef2aea5fb536e26ac159d3fa6c973a579564dbc2f12c8cc07d9a010f036bb2e421272e130fc151438e666b2485422303406336638912", &(0x7f0000000680)="5fecd148d6974cc05f8645fcd4efd2e979afed528e6b8e49ebb2a459911179a86fd0fdd5742bb92321312fc00af5fc18136a66fc7c547a14fe17c35d66f0b1c802699e3a017decace7b1afef82b1e806e84fd5e7088da57457f3c33d0a3c409cf5afca"}, 0x20) write$P9_RGETATTR(r2, &(0x7f00000002c0)={0xa0, 0x19, 0x1, {0x10, {0x8, 0x4}, 0x4, r4, r5, 0x741a, 0x3, 0x2, 0x8, 0xf, 0x0, 0x1000, 0x3, 0x6e, 0x8, 0xffff, 0x9, 0x1, 0x0, 0x6}}, 0xa0) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a000000000000005da070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=ANY=[@ANYBLOB="f36bed2a2b975ba3fbc61800000004000000000000000000"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@remote, @in6=@empty}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) 22:07:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x80800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20a0}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r2, 0x201, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6c}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffffffb}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffffffffffe0}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) accept$alg(r0, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000001c0)=0x7) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1644.315726][T31714] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x31c0200}], 0x0, 0x0) 22:07:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=ANY=[@ANYBLOB="1800007f0000000000000000000000009500000000000000"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0x0) keyctl$reject(0x13, r1, 0x5, 0x6, r2) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000040)=0x80000000, 0xffffff3d) ioctl$SIOCX25GCALLUSERDATA(r3, 0x89e4, &(0x7f00000001c0)={0x38, "44669295a1692caeb754b21ab86c544efe6882107935355f949d5dcc6544fa8058cf6d2f7ca58cfacbd019a857c24e26875bd0819f30ee748f0e560c7a80aeaec90e83dd01ee40dab38f969173d6560b2acbb092d2917d4cbc5da1b07a90d97dd1220c8444c3f37aab5cf6a9037621a6e4d65f57b5c705cc9a7f35aae023b669"}) 22:07:46 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74653303000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x88) [ 1644.485779][T31854] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1644.514505][T31860] QAT: Invalid ioctl [ 1644.521350][T31861] QAT: Invalid ioctl [ 1644.550806][T31854] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:47 executing program 2: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x3c) mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x8, 0xffffffffffffffff) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x802, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000200)={0x2, 0xfffffffffffffbff, 0x4, 'queue0\x00', 0x5}) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x10002, 0x7fffffff}) ioctl$DRM_IOCTL_AGP_UNBIND(r2, 0x40106437, &(0x7f0000000100)={r3, 0x7}) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f0000000300)=@v3={0x3000000, [], r1}, 0x18, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r4, 0x0, 0xaf) getdents64(r4, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000180)=0x200010, 0x4) [ 1644.771624][ C0] print_req_error: 600 callbacks suppressed [ 1644.771635][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1644.785068][ C0] buffer_io_error: 600 callbacks suppressed [ 1644.785094][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1644.801648][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1644.808967][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1644.818476][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1644.825771][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1644.834504][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1644.841691][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1644.849897][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1644.857169][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1644.865438][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1644.872702][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1644.880734][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1644.887986][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1644.896138][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1644.903475][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1644.911586][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1644.918779][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1644.931707][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1644.938844][ C1] Buffer I/O error on dev loop0, logical block 0, async page read 22:07:47 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x219, 0x0) 22:07:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x3, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x10b5, &(0x7f0000000180)=""/4096}, 0x48) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x8800, 0x0) recvfrom$ax25(r1, &(0x7f0000000040)=""/200, 0xc8, 0x40000001, &(0x7f0000001200)={{0x3, @default, 0x3}, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) 22:07:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x41c0200}], 0x0, 0x0) 22:07:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x3e8}], 0x1}, 0x0) 22:07:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xcb, &(0x7f00000000c0)=[{&(0x7f0000000140)="5633e7829d31bef1ecd8bed2214458701974a34f401e016e195a1a6ecc63ebe7c3bf180cf3b81ae9f28970de8165f2f78445cb5f1e502730bf682432fc65515f2e6bbfec2f8b7ae6449fcf23cd2512"}], 0x10000000000000cd, 0x0, 0xfffffffffffffd61}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000000)='self%\'[nodev2^\x00') r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x200) ioctl$VIDIOC_DBG_G_CHIP_INFO(r2, 0xc0c85666, &(0x7f00000001c0)={{0x4, @name="c45ea803345020b0c6e22654f2c289de25be2ba54eae108248a6ae917a7c7bd7"}, "04cbd0e2911d81a11983b75a43bd360518ade373b2f9f7373d693389d0168544", 0x3}) 22:07:47 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x400000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000540)='/\xc2x\\\xabSCMYg5V\xd8igroup.sta\x9f\xd4t\x00+\x04J\x00\x0f\xab\v\x02\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eW\x7f\x14\xb2\xa3@\x15\xe2+\xf5\xc6\xde\xc66\x8dF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x0f\x00\x01\xd8?GB\xa4\x04\x17\x91\xe0\xfd<\xdc\x14\x03\xb1Y\xf3\xb9\x14H\xd0\xfb\x88Kru\xfb(\x93\x16\f9\xdb\xfa\xa0\xf0\x1e\xf5#\x0f\xf5\f\x0f\xc0\xff\xe8U\xda\x10\xc3\xd8\'\xf0\xda\xf7\f/q\xfb\xef\x05\xc6\x9e\x03\xd1yG\x1e\x10\xc9\xb3\x81\xccS\x1b\xeb\xf7*\x01\xede\x00\xe8\x8e\xa3Z@\xe3\xf8?\x11\xac\xadb\n?\xf2m\xa3\x9fyD\xbbh\xb2!\x88V\xa0.\xce\xab\xcd\x93\x9c\xd2\xc6E\x89r\r\x98\x96\x99\x01\x16', 0x2761, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000024c0)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) [ 1645.120590][T32085] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0xc040) recvfrom$netrom(r1, &(0x7f0000000040)=""/146, 0x92, 0x20, &(0x7f0000000180)={{0x3, @null}, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}, 0x48) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=ANY=[@ANYBLOB="187c00000000000000000000000000000000000000000000"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 1645.213127][T32085] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x51c0200}], 0x0, 0x0) 22:07:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8, &(0x7f0000000040)="0adc1f023c12013188a0702bbdbbbec2b265e67bf3dfa11b7c90b1197cf2a50430014f9b05d324f8dffbdb4d4ecff1f508f4065ffa4f050f67612154686fcce4cb09f04e9b2ee023b26374344f65a842676c5f5dabf9dd19b1208cdd5d35d3dafc12bead1a377167b0ad0b51ddd24abfc6ef023cf325ff9fbc5012df647e534bb564e10579202a5c48873f8b02a42e36943cdef34bb1ab8680df53b1d1764e491734dabecc6861432c7fbb70f4f3f88e8027d6e6e7b4711ab823795a015c2db42707fb03a5e679e1b550c7ae847724e96745b05e04977c4ba00db07981a1bb2b") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 1645.403932][T32118] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x4, 0x4d0, [0x0, 0x20000300, 0x200004b0, 0x20000580], 0x0, &(0x7f0000000080), &(0x7f0000000300)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x9, 0x8, 0x800, 'ifb0\x00', 'vlan0\x00', 'ip6gretap0\x00', 'bond0\x00', @dev={[], 0x22}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @remote, [0xff, 0xff], 0xb0, 0xb0, 0xe0, [@mark_m={'mark_m\x00', 0x18, {{0x4, 0x0, 0x1}}}]}}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}}, {{{0x1f, 0x44, 0x8a75, 'gre0\x00', 'veth0_to_bridge\x00', 'vcan0\x00', 'gretap0\x00', @broadcast, [0xff, 0x0, 0x6ea9301682c8d251, 0x0, 0xff], @local, [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xa0}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x9}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x88f5, 'ip6gretap0\x00', 'dummy0\x00', 'bond_slave_1\x00', 'bridge_slave_1\x00', @dev={[], 0x1e}, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @random="2df8ed43c538", [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x10001}}}}]}, {0x0, '\x00', 0x3, 0xe792c413ec282622, 0x1, [{{{0xd, 0x60, 0x6558, 'ip6gre0\x00', 'ip6_vti0\x00', 'ip6_vti0\x00', 'hsr0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @broadcast, [0xff, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0xf0, 0x220}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7, 'syz1\x00', 0x9}}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x1, 'system_u:object_r:anacron_exec_t:s0\x00'}}}}]}]}, 0x548) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x134, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]}, 0x1ac) 22:07:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:47 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x240003, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r1, r1, 0x80000) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r3, 0x7, &(0x7f00000006c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0xd66, r2, &(0x7f0000000180)="c197eb7271c6d4c0674386a371d9ebcf04d105d931dbfb6eb4b8735ec75fea9a613a37c11bd6c54d43acab48bebbd8d7016fa5dc3c13ab60dea3a08f783a2135ece9c3163f300f3efc2323a07def6b16ea5a59f63b61d65e28f592ce3dea11cf618b413048ba59151620aea951010813a7b5a2243356294a1c830823f2970b0b026560e2a7aacf332618df2a3937c5c56863179c8a5154356d956892d27e060605d7ce7412a2dd4cf621ba496f6aca2bd4345190561d24cfafc92065f7eccbc2591574b2b75f5706da371cb865ff05809cc3d020739405a47d92ccffb9328f402d3758346e2c93601d38f07abe61dc9b13", 0xf1, 0xfffffffffffffff7, 0x0, 0x2, r2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x2, 0xda, r2, &(0x7f0000000100)="7899121df15276b2f782fb4144b2602d97ae826ab780cc107c173d", 0x1b, 0x5, 0x0, 0x2}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0x10000, r1, &(0x7f00000002c0)="f265add04372a6b0e4b308f19a8e89a4b9cd8f20307eaa6ddd46d604f223bb7b939dc0639bbf8257060f43efcac76e0534663e420667744c87885e565d53e5e6f174691336921c701b23c4730577708a55b1164688af4854517427b279c2c8699799acd868459fe7191ce972262fd87d5321e5a9ed60aab45864e7c82adbbe1ecdc2d2b82c030c8420e3d9897147cc1e87ca9bb9b362fcec5318d1082cae8af8c0ac386638f2", 0xa6, 0x8, 0x0, 0x0, r2}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x3, 0x2, r2, &(0x7f00000003c0)="05b77d358092cb8dffb1faa1fe00a96cc3997dc8e5fdc44df1731df68ed995bb32865ec7f3903c518734d1cd5cf1d8b924df2ed76705485d6d4782e7c390247821156e467c0ec0ebacf9f2b83eddd985ef19911659e72f6d652ebdf0ac8b4f218f2b3e56f5f0e6edf380b8aff0c2288c816cce9c5f09733bcb64d7a2da6428a83cf581140854", 0x86, 0x5a, 0x0, 0x3, r0}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x3, 0x49, r1, &(0x7f00000004c0)="1d8fac22c28ed50dafc66e957ae759d383f59063bf84", 0x16, 0x3}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000540)="8c43d670947d49327f69714589e78915cb7e5209cef217ed105d3689bb6e609fa38cb0eb1271b1e7af5d750000a9f2be36eab2e900650fbdd8960e9a5a504194ae65a9e76dc15abfe07550dd1fecd7fc6aa9d91dfc0e75598c53faf3cd970dcf1e86ed045c9c1e0f12584e5a6bc723814ee706e4c35fa4407be8153ab75b4004a8e5215dcb2027ba659caa01495f387b", 0x90, 0x5, 0x0, 0x2, r0}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x5, 0xffff, r1, &(0x7f0000000640)='8', 0x1, 0xc49, 0x0, 0x1, r0}]) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 1645.518124][T32131] kernel msg: ebtables bug: please report to author: bad policy [ 1645.552385][T32131] kernel msg: ebtables bug: please report to author: bad policy 22:07:48 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x21a, 0x0) 22:07:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x14d30300}], 0x0, 0x0) 22:07:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$swradio(0x0, 0x1, 0x2) r2 = dup2(0xffffffffffffffff, r0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x5, &(0x7f0000000040)=[{0x7fffffff, 0x0, 0x5671}, {0x8, 0x6, 0x7fffffff, 0xca60}, {0x5, 0x7, 0xc6, 0xffffffffffffffc0}, {0xffffffffffffffe0, 0x3ff, 0x3, 0x1}, {0x9, 0x401, 0x6, 0x3}]}, 0x10) syz_open_dev$rtc(0x0, 0x0, 0x6000) stat(0x0, &(0x7f0000000740)) write$P9_RGETATTR(r2, &(0x7f00000007c0)={0xa0, 0x19, 0x0, {0x0, {0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x6, 0xffffffffffffff96, 0x3, 0x0, 0x0, 0x3, 0x0, 0x7, 0x6, 0x0, 0x0, 0x401}}, 0xa0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000340)=""/35) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0xef, &(0x7f0000000380)="b58807faa239e783718da25f66325fbc4ba5a0321e0511dc0de30162c0a2708e585d0697d96ab914bc5fc1251c8dace40e335a7de5cd8ca3bc43432047c9b943d31590", 0x43) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r2, 0x40087703, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xa805000005000000, 0xc0, 0x0, 0x0) poll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x1000}], 0x1, 0xaaf6) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0x20f3}, 0x0) 22:07:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x100000001, 0x430100) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x10001, 0x201) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000100)=""/11) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000014e02354da47bb000000000000009500000000000000"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:07:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x3f8}], 0x1}, 0x0) [ 1646.022786][T32340] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="cbcb975b180000000000000000000000ebffffff9500000000000008"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:07:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0xacd20300}], 0x0, 0x0) 22:07:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket(0x2, 0x80000, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2000000000000264, &(0x7f0000000000)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, @alu={0x7, 0x3f, 0x0, 0xb, 0xf, 0xfffffffffffffff4, 0x4}, @call={0x85, 0x0, 0x0, 0x1d}], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 1646.176181][T32412] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x408}], 0x1}, 0x0) [ 1646.244505][T32412] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 22:07:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x2, 0x0) 22:07:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = fcntl$getown(r0, 0x9) syz_open_procfs(r1, &(0x7f0000000000)='net/stat\x00') bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x42, 0x0) fsetxattr(r2, &(0x7f0000000080)=@known='system.posix_acl_default\x00', &(0x7f00000000c0)='net/stat\x00', 0x9, 0x1) ftruncate(r0, 0xffffffff00000001) [ 1646.407976][T32475] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1646.444576][T32475] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1646.521763][T32475] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1646.538602][T32475] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:49 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x21b, 0x0) 22:07:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x9c100, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000040)={'nat\x00', 0x3, [{}, {}, {}]}, 0x58) ioctl(r0, 0x800007d6, &(0x7f0000000240)="fc9bfc39d2068377e60e1797a65e8bf5e18fa2903b4b670708160572e5b8356d60a4c0847bd70a18d3c756a8b178cdc362ee65772d905ae7f94a08cedad52e6ac2c1cc4466") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=ANY=[@ANYBLOB="180000000000000000000000000000000000000000000000"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x80, 0xffffffffffffff14}}, 0x30) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x4000) 22:07:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x3, 0x0) 22:07:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x418}], 0x1}, 0x0) 22:07:49 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket(0xb, 0x2005, 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r2) getsockopt$inet_tcp_int(r1, 0x6, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 22:07:49 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x0, 0x0, @remote, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x400001, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000040)) [ 1646.931711][T32707] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1646.951430][T32707] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:49 executing program 2: syz_open_dev$binder(&(0x7f00000001c0)='/dev/binder#\x00', 0x0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000240)={0x8, "1983f21965ccadd8bd52aabe54cdc6366c25d372ee5a0a7929fe096ae3ffa102", 0x100, 0xfffffffffffffffd, 0x4, 0x14, 0x3}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) write$sndseq(r1, &(0x7f0000000100)=[{0x3, 0x20, 0x2, 0x433e9c06, @time={0x77359400}, {0x4, 0x5}, {0x800, 0x5}, @raw8={"bc9e5b3efae2add37292ba5e"}}, {0x11, 0x1, 0x7, 0x6, @time={0x0, 0x1c9c380}, {0x0, 0xfffffffffffffffd}, {0x100000000}, @ext={0xb6, &(0x7f0000000040)="f8d507c013ab8b254e642f1673e7f70b05069d747aad1383733126c3f4bfc2034636237fbfdd00c358ea7e6300f0fa674df5705e89bdeeaa1408d5383c337a3961418e3740263132c4189d3dcc8d83e066e4746d2968151ee15c983d3439c4b88ec6181de0322575e6fb5568e4808efe58308833803599579fe10971dbd2f65f3d593e0c192bd1cd2c5832d4dfd578e84c046aef3223b929fc970e2f7d4377e3e9ba149976829605163a38e850e6a07dc3889d691073"}}, {0x9, 0x20, 0x6, 0x80000000, @tick=0x10001, {0x6, 0x3}, {0x100000000, 0x3f}, @addr={0x9, 0x200}}, {0x3, 0x80, 0x0, 0x726, @tick=0x3, {0x3, 0xfffffffffffff233}, {0x7ffffffd, 0xfffffffffffffffd}, @queue={0x10001, {0x0, 0x7}}}], 0xc0) 22:07:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x4, 0x0) 22:07:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x10080) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f0000000180)) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x103000, 0x0) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f0000000040)={0x1500000000000000, 0x10000, 0x2, 0x5, 0x15}) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=ANY=[@ANYBLOB="180001000000000000000000000000009500e60000000000"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000100)={0x6, 0x9, 0x6, 0x1}) bind$netlink(r2, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbff, 0x600}, 0xc) [ 1646.982727][ C1] net_ratelimit: 18 callbacks suppressed [ 1646.982735][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1646.982763][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1646.988458][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1646.988542][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1646.994396][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1646.999998][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:07:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x11, 0x3, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x22e) [ 1647.111479][T32749] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1647.138774][T32749] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1647.229558][T32749] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1647.242310][T32749] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000000)={{{@in=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) setfsuid(r1) [ 1647.622699][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1647.622717][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1647.628528][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1647.640225][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:07:50 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x21c, 0x0) 22:07:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x428}], 0x1}, 0x0) 22:07:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x5, 0x0) 22:07:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x90000, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r1, &(0x7f0000000040)="fca1db3e6e234da9cda7f0ba8a21b45c2f782e18f25d257a7c000b8f4f757bffcf0b23cb9b4ca6053d88290e3aba728f313dc6fa81da0cc37132243f262565dc55681b688451999c767f264642adbcad8e38d5c6a831e063"}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:07:50 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x1, 0x0) getpeername$inet(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=ANY=[@ANYBLOB="180000000000000000000000000500009500000000000000"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 1647.795994][ T488] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1647.819263][ T488] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:50 executing program 2: r0 = socket$inet6(0xa, 0x4000000000000002, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x10000000067, &(0x7f0000000000)=0x1000000000ff, 0x4) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000440)=@in={0x2, 0x4e24, @multicast2}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000500), 0x4ad}], 0x1}}], 0x40000000000038f, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x7, 0x3, 0x8000, 0x3, 0xc1}) [ 1647.928010][ T488] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode 22:07:50 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x2000, 0x0) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000080)={[{0x2, 0x5, 0xff1, 0x965, 0xfffffffffffffffc, 0x1770, 0xeca9, 0x7, 0x1, 0x4f, 0x7, 0xb3, 0x2}, {0x5, 0x2, 0x7fffffff, 0x1, 0x80, 0x2, 0xd0, 0x20, 0x10000000, 0x2, 0x472, 0x9, 0x6873400d}, {0x3, 0x3, 0xaa, 0x9, 0x8, 0x1, 0x6, 0x4, 0x1, 0x1, 0x80, 0x1f, 0x763}], 0x8}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x1) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r2, 0x111, 0x3, 0x1, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x9, 0x3, 0x310, 0x158, 0x0, 0x158, 0x158, 0x158, 0x240, 0x240, 0x240, 0x240, 0x240, 0x3, &(0x7f0000000180), {[{{@ipv6={@rand_addr="2019969ea3bd75bd25bc50f87bbf997a", @loopback, [0xff, 0xffffff00, 0x0, 0xffffffff], [0xffffffff, 0xffffff00, 0xffffffff, 0xff000000], 'syzkaller0\x00', 'rose0\x00', {0xff}, {}, 0x2e, 0x9, 0x6}, 0x0, 0xf8, 0x158, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d4, 0x4d6, 0x7fffffff, 0x100000000, 0x1}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@loopback, [0xff, 0x0, 0xffffffff, 0xffffffff], 0x4e23, 0x4e20, 0x4e21, 0x4e20, 0xff, 0x7fffffff, 0x0, 0x100000000, 0x6}}}, {{@ipv6={@mcast2, @mcast2, [0x0, 0xffffff00, 0x0, 0xffffffff], [0xffffff00, 0xffffffff, 0xffffffff], 'veth1_to_team\x00', 'syzkaller1\x00', {0xff}, {}, 0x32, 0x400, 0x1, 0x20}, 0x0, 0xc8, 0xe8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x370) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000df86a9871b360f18b0013aa329aec06c3e1ea861809e1536946c2abd1a8e8a000000"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 1647.973285][ T488] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf00512cb9c97b64226b7cda8bd329636d6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x400}], 0x6, 0x0) 22:07:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x20000000000001, &(0x7f0000000040)="7ae8f6eeeca80a974fbcb429d963097d8995b45fe275f66887a264baee9c757693b24a4513759ca7bb83f0f20739394cc13d60de8dd637b3838756c6d09510779c197bcb9c79476b9e3ba59650e75f2b330b7794b9b54b67b48f830e2eaec98d05aab7f018fea716e22ae16c3f8137ecfa8bf359675fb9169925a9ad9c163d292154bd1b44d17717f8233e06dea320331b3cd454a5ac1cfc8a67b8387fbc006cb572e56863f85e4dd6a9ae6b08ce082e07bd23cf8c869a") connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0xa3, 0x4) 22:07:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x438}], 0x1}, 0x0) 22:07:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:50 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x32e, 0x0}}], 0x40002e5, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001ec0)='net/dev\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r0, 0x0, 0xb, &(0x7f0000000000)='systemproc\x00'}, 0x30) stat(&(0x7f00000013c0)='./file0\x00', &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001a80)='./file0\x00', &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = geteuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001900)={0x0, 0x0}, &(0x7f0000001940)=0xc) fstat(r0, &(0x7f0000001980)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) accept$ax25(r0, &(0x7f0000001840)={{0x3, @null}, [@netrom, @netrom, @null, @rose, @default, @remote, @bcast, @bcast]}, &(0x7f00000018c0)=0x48) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000001e00)={0xd000, 0x0, 0x2, 0x0, 0x3}) iopl(0xffff) memfd_create(&(0x7f0000001b40)='hfs\x00', 0x4) syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x1f, 0x8, &(0x7f0000001700)=[{&(0x7f0000000180)="ea86ea4bb9302758d883206dcf9aaf1212133937ab906b65887e3c6415048c47bc23e1c4369e9b7df3496791fe8acb1852fb08bd5d40f0a35e7264c2cf85abd853fffba45e9566ee2060f9416b33f6546ae2bbe890a79ef9c25154e9fc1f0fcf22e189c293a866b703cea2687664ff3d564a789555c713cc545b3d", 0x7b, 0x2}, {&(0x7f0000000200)="019eeddfe948398f8aa43886d4b8089d07f4329bd3c522f0919cc7d07c2e245cefc5a76f50b50d6456ea531897501a5add6fe5013c646c478ab03c3558337249fd6c573dd83ea1251bd0e5c6387f9bdffc216e5356e21da79dbeb058fac9e9", 0x5f, 0x9}, {&(0x7f0000000280)="ffe903fbaa574107de1c47365e980c8c670dc9448244bbab0be5a11957dc2b809372a08d61e0a9f63b4f14371bf891bba0d6a706d06b3dfa07225e67503a2571895a9b2eba37310ce48d50ebdf1ad3e36a2319b51f483ae9788318c3eea1b2485dba28f0e93afc57a358b88868d97e5cdc0d0904d9bbf0ab7d4345c5651a3c5258a4c64a5183c17389107dff39275bb1fc16443e1032e7f0305e83b2e1160473abe232754bd3acafd8ecf412168af86413d609d110d6c17a4f5885661f66a64a5adba6dd037b5f003d530ab953ad1a08a62562fd01364278bd5adb155bdf8c2fbed4a744c6d55a01e10f603a95799196fe3fdf3714b63e5078bf1e03ff12738afd597bf1635d74f654507a742576d8abd471cf6b5fa2b58ede88cab33f2ca13b94253098d008de4756cd7e8924cf47e57790e5776cd7035ff45352848e5c12c6454812242b40210b17ca5e02c83da890f19679bd8a008b8045ab5c1504287d4ba33b3ea31646086d9eddcb6fb60736094194da67187bb6e7de8ea372b8903256dffc7ad89e89cd03bfb77af155d080c4d19508db4fdeca7d976bd4b39ed4a44efa64a842c9dc4b3aeb391be0f3d1ba62e510a402faf7ab00aed49153a87d7819c50c187405072b2b5c0a40160ebe60699baec5a2fc134a81e1c7159e62b9641dd6488ed962017499c236ef31dc6eace18bfb6cf76a1fe87661e2ad4d197fc1cb2589e417bde96f47ed80b3519ed3d7967b8ff642c1e08c9853441621e4752be60f2a5c2384f6f3d0e9bbf7b0b57b910e821fd56dce283c51915339d5c6fc0ee80a9260cb3ea5579e3ff074c1d8e43e306ee206c37c260a0bcd537018da075ca87af4912314cc076a9c8ce2bbae11b5e4596c7fc0e7d1f214523ff7234be288c97ce1223c48c271f236f2c5be6a4a4cd32d87034a44dc84d5251e1fcb2b7b420a1f6cc3c31280eaaf0be857b3ce71b80f72131ac78b04c6c3be04fc0982a51a171d0e008e3df74f4f58675dfa2c26d95527cf10f12ff6b3a96fa2cfa6304a10b90d62f91725be87d4925ec64fc6be6a61331b879f0c4af1a4f845e9d147e1e257c3bd71b8cb16cec16355f5c4d712e3d4a12f5bf4ee7f63be9f72e6d3b8441d3271216df9bd21e0c9eb5dfd69cefe7dd20b72285d5ac76eb02bc4d0539041ab4fe22a649c42282a1d60f18ecf4e58930d28e9ca74827df5cf5e5df374d34c6e3c89e9d46a20f01d5e5b47c8958fb3b330194a60f0c6ca5ae6f2674022e7504c4a0989054fc9c51848e1d1c81bf293c7ff5a61598e134b2165468976531b7d11911b40ab2f8b65e79ba08320e709d40b33a0992a4ec39d002f5b67fe5cdc4bbd5c4bb0b7300d937164a18973b311b8af5bacf7761909f4df2ddefcd9168a5e7db952a1a7af7afdf97261e9932476b00fe24e163d48f5f03b1e40661264236a0d64c6db5e507b5784dddd1426dca20144c86867bf6caf77177d96f4a89d41502ca9e1b9a361fb19abc0c8e088f49118adb9e137c3690d08a3c19001fc6023331b541a9a4c8a5ece6130e71af6adc23c23364b4f22cebc2b9f8b000e3ea84e1023b9960c01875ef1c4e34f12ae9147abe2eacc7f2c964bac8970a27268ac0abb99c25b756de5e6ba9b43a1ea17f59d795fcf6adff6d3780516aa9c1aa68f18017bd292ba2d97346aea6055bb4a4f385aad7f74220327559570b5ee109cfaef657c862831bd3e1acb079dbc3d22ac6d923016c9ca719e02ffa7c4a398adbf9699822b3cce33bfdc7ae6151fa3bb4460d632aa4055ecec8bffd31e9080b5bfa0b8ba2f4e12d94fc9e0a04707971ae0d6dc7a7f78e0a3e954421b42e1da1ea982bd1961d768f5fc64fec770e4f3eed5c31ba55378f2abd357afc31a629886b93fa2d1bb1bdb4ee92794dd35205750c21e8d954f6fa13a58d450735976d0ec3d8fa494e6f3bd07ede48bec02e0f5d215bb32e4c5e8f200ef07c1b0645636e666d665dd540b3a79eab72b7675cea0dc37aa888da53583d3c7ac546ac608723da83749c941f9ce7c39fca223779b2ae9f5e8ac0ea3bc5c2faf14293a49be492f1d9ba7973769488c241773f4ccfcb7a52cada29696d08921830975b1fa04fc5f0afdb9dd3a9fce1a3a641b4889956cb4a0525e99dc8d955d470bfddf2d9f96f7d6c271684debec857751739a73a2b168be94abec5ac878609dedc910fbae05f4f72c9338c52f2f11b17dc6a6bccc558e2f623118c5594e82fff1432ba56cbd09793340d4f8f520a126d150212404f6bdfd694f841fd2582344da63b31d9c32bc742d2bf25b2bcdf1b6af582d516d9dac8f3fd36dfc4eb329b665fc0882f789931466e7dbc67f8c53fc09b3817944df2b777e841fbf8bcfa487f35aed0676ca01ff6ac6dca73f810e32960d8552e1ff2000e55a7f15911b9c39659b2e2485d9d238050b65a4afbde48da1d80d8a5c6ddb77c87e9164b795ded8d1a0e3973e6563b0e74765f20c3e6f073da5b953e41cf2fd845c89471996a293407bc5e4a43cfccda1ce302b97ba2c92b1f55e35e8e9e530306ff1dc70ee13db0dc22889833fab58241132158b86b77b68f567cd38d1b261895caa0290a1ce13b0248a4a55791424c9e55c54948c0d5e79d7594b4927026a5066eb154ee10c2c25a46fb2a4b9b55db6247ed331aca8ec247aaabab5b6129250a7ab6a3cceb646f8ca9b0e2c8b472e4c5935446544b08eb52c6ced76e65e562f0c3b54b82b60aaabcccde411cb986a1a4f403a9ad9b8cc1bd08f0d5dc78d208cff154b4979d9e3820967fc22ce3cafa57a4173d2980981c4519e0f1a58ef8d6aead14d96b0adeb4f513c63c042d3b1dda6d29c9e317f96034715b1381a9c0e3875ec9b75e0051b5ca86cc2c622c429464d9d821596d09e3564f2600f8e32e479af72ed87c76941bbeb3f1d7f180781d7c8a75a25fd132b4e018f2540296b59fabba7029ead0ac1f11aef6bca98dcaf1b66964ad0abdb322ff9ae1fb70a19678262c1eae9f2d3185b5904f8e240fec4dcb8b3d601d3595e9fbf1711630d784909a27f474b924a96b6347559c0a9ae3f26896ddb9a4e7f330c9e866764babba960641e8f93e743a1d1e1d1d9aa7f5f929704043075595131fbcdf0d2dacec902ba9e6f1393be1e932fceed2c3f1a3bba4c7f5b40183a2f893cb05ad49acf5d7c8312768f27fc4f6e7ecdd49598ad6c557546b051daeaacb69fd1cb8142ebb95236fc665e6c42b873f1f14e8c7c391a07d4141d2c1c84129b29e2fb4ec1e622aa83c5622e9eb2d0353a6488783ae2c638f0df5422aa6c540b1ac8759b8a5a8fcfff692c5ff004d5e4cc3298cd8aa3d953a160adb4400db54866aa6ed488bc95600ba4aeb0e0733e1caef4de525bb3d7ba36b38e59a41684850eba8fede1c7712e34cd9524c515af6621c8489b500f659d5a3bb70bcd030eb38b1e01ae2b720b389cd08bfd7c6861305896e9dce179df848ebdb8b31ca045bd792a2d1a01adeab0f8831a5212828677d66a7f958c8f2c7f263871a1bf3cab420dda89a3e352ac8c62f7e9980fcf812853d7be8660e1fea9d5b957dbd4d78a049aeaba4a7cf6049b61b09b697c3a9558836cb5dc4dda56d4a276370038240ed44381feac53095aa607ea5f66a5f66795a591df1d1cfe96c724c53934c7a8339487d873a3d029703022c22debd25858a45d572c36dd5e0c6d76d205cb90709ad82ce2e3d0e827b211c98dfb2394462912f0d26c34f64ce5dbaea927c447b1127480a055ede08e98516aa8a016200e5840714dd80f05e84948f7db28ba21d940fd68b0ed88c4bc696058023e56b8d7c4ffcd7a89cc460721279f331a5ca8589b902906b6a0e6fae061e650a7a2a5f0b9a1177e220f5bff71c668ac5a1b256be12637ee7ce3a304d93522a57fbd340ad261778334494d9192d215cfd383e68e038dc7da3f23411b8b5e0df448eac318795be66cc465cadc899c9f65e110c3cd6c9025743f8fab16dc10721289cbbe56b83ea331ad3ec68ec4a625622b78a1d57fa34500667aed797a19da9a5560311616b2625b6e0c503c7fe576d31307d57f0ef77528d86e2297b0426adc30710d49e38bca7a6e600a022f8725e6b918a7a7e253f4ec212e1b19f769a110d7c67617e64cd809198fd0a6c68831becb4b8275197209e7e8626995b848b1233a18bef6bd0c2f017e782c9d100ac105b67f636d1f2baa3c4e1188db672ccb4de4fbd0e674498508591254beb5171575a94cb92975c85ba76b04d7cd2da593fed01f31d4d202ee7f89cdf209a13370d9b04cc142bd5e7f79315fbb58c92ea3a1cd4fec48be5c24b0b6209c209f191bc6a7648b08d6f3851387c512b48c811fb9b8f393494542fba509cb1fd7960349e4b349076999c5192cd59090721a279e0ffb3a4822fdd27a0487c65beb2250d332762938bb1bb19c1da6ea0355d8e096113d8f426ad891642a042648796b53b8a1dc69961c1d260cc826c26a64a93671854d5f0e0e3c88e4d4093d2cb1e01b2eda459f6eaaac6d254cace9b840d6e94a5eaa9da3da1977c9351dc6c075022e1ab7eecb8859cfeaee13d1669fdeaed998bd284bc58d7f10fe1770455e6db715d5f3112bace25bf4eadaf639a0ec0f1fc0b68bc95a116ae71633b670ed20152580bcb8f1f971d23ab2db084e895c69fa36ae30692486428bd809457866dc7f6861bdfe76a787d9e863da519c1b7d828669c2684d5445a9ed71a822e2c4837bf52e79d5dd5e74707c317788adcff80cb8a8c8a2e753dacb10494e762221224530f77193e1c94bb0c4adb927c8e2e74930441b1d3a41b116021d618371c68cf177467822005daefbfd05a3bab03c2589de65426d9bbf4e5bc058b906ec502f0bcf999dfeef348eb182884a4ef6b6a7cbbbb6833a76b6845c0fc99358fd2637264dbc5e667f1db2d18f9fa2a3405d71b76c0b4b29fc156be599645d74dc69cf65d4c051d5cff2a8e074fc1f458c5e55d65826adb98843932f33fe0369c6df667540de8b020d3e748373ceff962006a668c748bbd477e7b67e023b305335eb9a662bffed2e93d643b2ecc7271bcd54ce094bb645b8ce5d1cd05ef1bceca55ad09497fb130e2277ca0d0595ddadf9b0f2290ff3fe9906b230775efcbb447bb6712c7d925915632a10384b8a7bad317beb50e8d2c5c17f2988a7d47564dac4e8820065f6ec7fa84217a49c15a4269526520e1031fe6bb64aa2f1f6a30f6ed988d328d3c3198b7505581475ed2d4a975f6b56a9df94d8461232612b870f11aae2d9f79eed2dac7231d136f92c707d5b52fe18bd5ffaeda8eaf54436b9a4c8ecb9c9c4700ee7b4c0193292f2618a1fde411305d7590eb0e4dd2f30c548065d713d3f7105336b4c2832ef01547faaed2207b64fc09f8828a6e858eb4ca9ecc5569508d5837f37875dd1b6a16d160d97f3149a73fee82838f3215654b003386c7a3b0ce3de3fc87165b1b811ba39e7f58d926af0544e87dc6933e1b124394c4e9a1ac517aacbacf09278856b2a3a0509ced7206b622cc2c23aea6d9b1155cff3140efa54b2a6d03b690702710aaec600f5416a086a285f39d4eeec0516453887eb19a1473c8a07dcca2aba1e226d2bbd3ed1948bd19c6501de4fd1695dc3634f6bb9a49c4d1b7375a191c3f70ee5afd7f3912b093cb90a67ee2448d3535aafe243e844765e3581fa4b57e5f34ad97454051242a72ab27b83730f75f3eaac68776f0d4ce39f7457fde5728fb1b81097fc131809fa27886ee202ad8ffecbe7d8a813592d030c1e050846", 0x1000, 0x40}, {&(0x7f0000001280)="4d74e0cea8349cc8b75005ca8ae901c3796f3450bdf82a9c02cb50d048c4cad012650a8bf950b4f8e1ec0fbea2add5f307abcedf50941bdeb6557f23cf6c5441828d6065a024d749f787a75b8e3af5693e4b6b4f5a56997e9c596338709d47e217460af85f9f9985d76162c69b6b5bc6d602047d3781b09efcf19bf4f23237dd42b13b3b240e8efba2191bdeb2a773affd121d2ab1c92bef881cf3d87195ca560a8d6e12ddf39f2939976c72c073bf759291ff2939b3aa06c9e5e9f881450895f655a75da13745ed", 0xc8, 0x6}, {&(0x7f0000001480)="d83a166a433df088cc23eae117f6ffd6db64f6c2334d9e1018d4ba39c82142dfec0fa7e85435e114d4e3892a3b6433fb1271eb63060baef23c9df0a12eb739e5ec8cbe83c883694dcf5aa9b190e9692a15c951c84201a2d65accc714562db9020941179876d82183a4fa356cbaabc4b48b43c84b5708f67d73ca03fe6ce826025c16060c97edfdf58eea649eb4f2824e90dc3d3393884e77f0d24d5d9ba5ead854c6f685d269c4515197929a49bc29fec6b72a508c59a0b4924f202be7428d4cfdf4ed7ce72bb6871466cc5420e7817e931b603edfedecb3988b9971", 0xdc, 0x30}, {&(0x7f0000001380)="4e46faa29a44463273b6b42a7efcb95e620ea2960ce02a217f6c5faadd32dfaf396b62000c6b4ac217861e71630cb2cf441c40593581ad446661b97b77b211", 0x3f, 0x1f}, {&(0x7f0000001580)="9f15d30af54c61f2bc24055da836e3da1da71b3f88d021e5015705d830e8c91583bc4c2893b770ff4bf778c2c345551a07597777f868c62040e715650c85d8ab5341d20b0468a00658dbce13a2c51c4462bf1ee28f4fe6515f4f4f375a54f34b980bee4fd1f6d5b5cb8ac5addff02e299ef445c8ff118df18cb3ea79bb231da65f70baeab9d1827e231ebd323ea6513df6911c0571860aa020757f6be7cf43fb5397cecf8a55521c0b03007e9c0d27e35addeabdde86b09836876a50f2eed2e2601468bc0bb5b592dee7ccd203fc0be29ecf7c8a2c8379f0e013ac9e88a7d41d54b74aa25b186e04", 0xe8, 0x6}, {&(0x7f0000001680)="fc698b361c8481376399700cc976295a1eda31b8c309e6c4ef294817696b7c55605c5f8b659cf5759ba6662acf42912e651f263d1294302dc21c46444eb4c74212626095873efefaaef0", 0x4a, 0xba}], 0x4000, &(0x7f0000001b80)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r2, @ANYBLOB=',gid=', @ANYRESHEX=r3, @ANYBLOB=',quiet,uid>', @ANYRESDEC=r4, @ANYBLOB="2c6673757569643d666521773333b1792d373761642d303364662d34373b7f2d7c003832770077312c736d61636b6673666c6f6f723d2c666f776e65723d0d2ea7a5b39b13b74b7d300500f266434524f63a4b0fae9884a23ced92a15527353465000000000100000051329eafd8c9925205334c33e20b6056cec0377a", @ANYRESDEC=r5, @ANYBLOB="2c7375626a5f726f6c653d73797374656d70726f63002c7569643de2ae78703f94e2f40b9cbbc378daf951a20f68a5fdd82d5b97acba9dfb8536cb4b3a0c3a011836d004fb02f5eeafb8934d97b29bb68edc4634ec56e785de848908661c212d33b3789d2f9384607904fbf3e5cf9e567bca5467b0d7faa4227879c4f466966493536e1b8e19578f8b21208a4d9b27da19a3af85e025bc0ce917e5c74566a6318954df8317037468133389c2c2f8c467a6e6aebe13f3a7e47592e7", @ANYRESDEC=r6, @ANYBLOB="2cea54d8a948fd37af6cb3aed27ed11a4574df662d7f4651baff895a9881d2f993f0ce3fcb302ef91e5ae9c3add25aad8e7ff24501ee240fccc02eed0fc13d232e14df79faedca58e880a81e29949d5960efd75749052abcd5f1110767d1a68b327e540a4f97dc1d65acab88710a400277e0e89476a9c7193d197bcd8c326d7e64a258a0366eba647c84eec2bc208eacb0b40e3d62e7d5439e6230d43710a6c6daaa4cb8cadfae71db1063600eab716dd88803a6ebd227335fbaf5e9e888232100350fab3d15627709b6db3d5928a207bac01c31"]) syz_open_procfs(r1, &(0x7f00000000c0)='statm\x00') readlinkat(r0, &(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40)=""/3, 0x3) preadv(r0, &(0x7f00000017c0), 0x10000000000001f7, 0x1e00) [ 1648.200283][ T724] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1648.217196][ T724] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1648.273619][ T730] hfs: invalid gid -1 [ 1648.277981][ T730] hfs: unable to parse mount options [ 1648.371358][ T730] hfs: unable to parse mount options 22:07:51 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x21d, 0x0) 22:07:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x159, 0x4e, 0x94b2, 0x4, 0x3}) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:07:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x7, 0x0) 22:07:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x448}], 0x1}, 0x0) 22:07:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000400)=0x100000001, 0xfffffffffffffdad) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffff9c, 0x10, &(0x7f0000000040)={&(0x7f0000000140)=""/233, 0xe9, 0x0}}, 0x10) r2 = dup(r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000280), 0x0, {0xa, 0x4e21, 0x6, @mcast2, 0xad1}, r3}}, 0x38) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=r1, 0x4) mmap(&(0x7f0000003000/0xffc000)=nil, 0xffc000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff7f, 0x0, 0x0, 0x0) 22:07:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x100) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', 0x0, 0xa}, 0x10) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, 0x0, 0x68e85cf1839918ec) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x2, 0x0, @ipv4={[], [], @loopback}}, 0x1c) socketpair(0xb, 0x80007, 0x6, 0x0) r2 = accept4(r0, &(0x7f0000000780)=@ipx, &(0x7f0000000800)=0x6, 0x80800) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) pipe(0x0) bind$can_raw(0xffffffffffffffff, 0x0, 0xffffffffffffff92) getsockopt$bt_hci(r2, 0x0, 0x84, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x5, &(0x7f0000000240)="0adc1f023c123f3188a070351a6ec407c47546141107ec322599766a1e3818323a3ac9309c8e9651be354d6d11b031eea6634b03573277c4bb0581cfe8c149a4f9aec8803e9b44aaac0e24d30ce647a04e4c54300a692ad91600e49a1d641a6068516bd7647d8bff7f000045780bac5d57c63cc234a873dc3877caee9bb632905c94bacb3a8d13d0c7a5e4673e35e18b4f198ddb773e03874a8ecae52184b36182d5a5125805553d8156f1f2cb0f639eab6ce161922df497243279b2351acb5853bdb3dbe8c7e0503c32d9491440eaad14ba6c60248830b364bd1c85b790f2c10bfd") socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x344) socket$l2tp(0x18, 0x1, 0x1) socket$inet_sctp(0x2, 0x0, 0x84) pipe(0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) gettid() ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) connect$bt_rfcomm(r2, 0x0, 0xfffffffffffffd3f) 22:07:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000180)={r0, r0, 0x7, 0x5e, &(0x7f0000000040)="780db7a34156a5849a2030d133d4325f2ecac50b8b6c7784d233121e6efd6ef8d12953cb2596dfc308d007316df323ce8a5e82e2d4663843e9415061313897b81f0fa4935cdb02b0bb646e557fc8097f3960f29f90c0cd623709b1952c80", 0x7b33, 0x8, 0xff, 0x400, 0x80000001, 0x2, 0x100000001, 'syz0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f00000000c0)={0x100000000, 0x6, 0x8, 0x0, 0x6, 0x46, 0xfff000000, 0xe1c4, 0xb20c, 0x3, 0x4, 0x4, 0x0, 0x97, 0x1, 0x3637, 0xc7, 0xfff, 0x3f}) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000100)) [ 1648.711030][ T958] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1648.721573][ T958] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x8, 0x0) 22:07:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$setflags(r0, 0x2, 0x0) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x0, 0x2) getpeername$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5, 0x4000) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x1, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(r2, 0xc0106438, &(0x7f0000000080)={0x4, r3}) 22:07:51 executing program 2: r0 = inotify_init() fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r1, &(0x7f0000001a40)=ANY=[@ANYBLOB="093d38fc3cf6f179d5a9e9eec569c0f320a301b87c7c6afa2f15b78f8defdedfd1aa7cf8e89490d3d11009d6bf4661167dc6", @ANYRES16, @ANYRES64, @ANYRES64], 0x44) stat(0x0, &(0x7f0000001700)) getresuid(0x0, &(0x7f00000017c0), 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x83, 0x0, &(0x7f00000018c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PPPIOCSCOMPRESS(r2, 0x4010744d) [ 1648.927535][ T1063] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1648.965086][ T1063] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x80, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f00000000c0)={0x8, 0x3, 0x8, 0x6, 0x4}) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x80) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000040)={0x400, 0x8, 0x0, 0x2000000001000, 0x2, 0x4, 0x80000001, 0xabe, 0x7, 0x1f, 0x4}) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0xa8f) 22:07:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) [ 1649.059528][ T1063] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1649.082878][ T1063] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:52 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x21e, 0x0) 22:07:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf00512cb9c97b64226b7cda8bd329636d6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x400}], 0x9, 0x0) 22:07:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x100, 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000040)=""/78) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:07:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x458}], 0x1}, 0x0) 22:07:52 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/106, 0x6a) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x2200, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000180)={0x18, 0xf, 0x1, {{0x42, 0x4, 0x4}, 0x6}}, 0x18) r2 = add_key(&(0x7f0000000380)='.dead\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000400)="395e8fe83ec856b1afd1eccae92a9942bf07ccec55bd2e45606b1248503dcc2cb5e2b84ed924b88c543c8bf84f5cd884db5c782a993fa3527a21265b38337924e4588664494799b02715917965ff20c6f167254921b11166f513451a13fa575f1ca5993c5cb9fcdc80cbd5c4c202981a27a8f7acc7f45a7a1dc20eb7f7a83295140499d3bb29cfb8f1c27fd8bcd4289bd30d63", 0x93, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000004c0)={r2, 0x10000, 0x1ac}, &(0x7f0000000500)={'enc=', 'pkcs1', ' hash=', {'sha384-ssse3\x00'}}, &(0x7f0000000580)="b6b5e4cb5bf7de5cf8c259b4d0508dcd274c6bfe75db7bd940d3b75377283f736fc8dfed1056649fbe688af9dd2e7f1340387b6faf48e13c82c1edc5d3905f4d74edd9d9ece3030c2b564b826d71a7d77c0483528c38a28778bf0b9bd13a36d25225f5cdbcc7f023419b5c71ea6b570d72c7eeb359d6d097b95a786888b41708cbe8212938d2d7a919e684ff06262baad14f6a667ee2bcf5d48b307dfb19522663e73f3b21e31a27c72ede414885292e067f3d770fd74c69fc3e32a09033f3f885799bd33338100d87a12c8eb4357581d2851f4f110b276ccd1c4953efbe34696048", &(0x7f0000000680)=""/136) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000340)={0x2, &(0x7f0000000200)=[{0xfffffffffffffff8, 0x4, 0x0, 0x6}, {0x3, 0x4, 0x9, 0x1}]}, 0x10) vmsplice(r1, &(0x7f0000000780), 0x1461, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000740)=0xf6, 0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00\x84\xe0\xda\x82a\xbe\x18O\x17\x1b\\\x143\x06v\x9b=>\xc1\xd9\x06\x00\x05\xf7\xae\xce\xbeA,j5\xac\xf5\xf0&\xc5$\x951QC\x87\x9f\xe0};\xac\xb7k>0\xce\xcd~\xd766*\fo=Cg&[\x8b\xe2\xbd\xe9\x16\xc6\x1e\x97e]\xb0\xed\xe7I\x18\x96RS\x10\x8cyr\xb7\xcf', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8012, r3, 0x0) 22:07:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x8, 0x10000) sendmsg$alg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)="bd9e05ea74aa0534c084f6ee4d552a65b960f92e1935096837841b4336c72306ff8971acac5a457d", 0x28}, {&(0x7f00000000c0)="82488024d147d146811bac155475186045679bed76af70558d146995f4863e1aa23a4f4d36f9b93f15fadab6c6fc13271173107800f5bf6ccfee63efdd35deba6ee0eddff47518ea90bd257ceca5dbf192115c43b104a960e602e6d22d852f16cfa6e58a36067cd26e0e5ef5d7894dbcad4dfa591f5be6", 0x77}], 0x2, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @iv={0x40, 0x117, 0x2, 0x29, "073bcf986708d32e9281c3206b9827d49dfbe5c305965db4c835013026d11c63049f0c31eb7da72065"}], 0xb8, 0x4}, 0x4000040) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 1649.609782][ T1337] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1649.626441][ T1337] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0xa, 0x0) [ 1649.779331][ T1352] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1649.797533][ T1352] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x131, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:07:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf00512cb9c97b64226b7cda8bd329636d6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x400}], 0x23, 0x0) 22:07:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept$packet(0xffffffffffffff9c, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0xf) fstat(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@dev={0xfe, 0x80, [], 0x21}, @in=@multicast2, 0x4e1d, 0xfff, 0x4e23, 0x0, 0xa, 0x20, 0x80, 0xff, r1, r2}, {0x4, 0xffffffff, 0x7, 0xa, 0x9, 0x9, 0x8, 0x8a}, {0x0, 0x8, 0x9, 0x1f}, 0x80000000, 0x6e6bbe, 0x1, 0x0, 0x0, 0x2}, {{@in6=@mcast1, 0x4d5}, 0x2, @in6=@rand_addr="ee2c9acf3b8fd3b34edbcd717327643e", 0x34fc, 0x1, 0x1, 0x5, 0x1, 0x6, 0x4}}, 0xe8) ioctl(r0, 0x100000890f, &(0x7f0000000140)="0adc1f023c123f3188a070") r3 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000000)={{}, [@remote, @remote, @bcast, @rose, @null, @bcast, @remote, @rose]}, &(0x7f0000000080)=0x48, 0x80000) setsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f00000000c0)=0xfcba, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x1b, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000229b2c4ef0add61f000000632befe704ea094fd59ee75c10f899f176131f75b1669554daa3a9edc48ff8b9a3589bcee23c3103a990ebaefb98e9391b4608a7df3f07cf01000000813ed91ed7462f35a875504e86b9476fe3aa52b7145e306dceb052fd891154e8cfeba461fe61ee7846b1abdad2eb9e135da5b5b1154ae4e2847de6ec577223fe4d05944c3e66c967e0ecf3efc916f43bad9f153f757dc99f2a364a3301e394f8f2b98c849eeec6551e10c0784f9e85221397cd183baec7830c50fc11f6e696ec7b58c6dca42547e9ceb1fd"], &(0x7f00005fc000), 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:07:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 1650.379329][ C0] print_req_error: 478 callbacks suppressed [ 1650.379338][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1650.392726][ C0] buffer_io_error: 478 callbacks suppressed [ 1650.392736][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1650.414531][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1650.421814][ C0] Buffer I/O error on dev loop0, logical block 0, async page read 22:07:52 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x21f, 0x0) 22:07:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x2d, 0x0) 22:07:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000005c0)=0x0) r3 = getuid() stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = fcntl$getown(r0, 0x9) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000780)={0x0, 0x0, 0x0}, &(0x7f00000007c0)=0xc) r8 = getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) r10 = getgid() sendmsg$unix(r1, &(0x7f00000009c0)={&(0x7f00000003c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000440)="8facf89878c3e927de1c41e84e6bfd1cbe0aa366bc120bad601adc2ac0d12cfc74e7bd276b378108", 0x28}, {&(0x7f0000000480)="d5e2108297d0de41fc1b7984c0aa68978c62aa5f8cbc9a1528fab6d2a3fa8fe1ccd4952cc5da0e15f9590174561a1914838ec1e894046d72d572cfb46c323783a46ee880d40c5c8b6104420ae9087ea1f3a7fe1fc511d7f4141a60056cb1598c08b8d476118ec9cc27e99123b8f9303c2b925d2709b3689ab855d6c57d4347b89b5463b6dc6442452ddec89224b6b2fc7f2bd9dffcd976f96e8fe56a09dd32bab729085d07c18c92ca459b8bbe4bf507214916c95754646e0451c9dc9392c006ce7e39c240e6437ef8f9601462013c6b9a412786a545b56a53b0324def", 0xdd}], 0x2, &(0x7f0000000940)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @cred={0x20, 0x1, 0x2, r8, r9, r10}], 0x60, 0x4040}, 0x40000) iopl(0x51d) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$packet(0x11, 0x2, 0x300) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@dev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0x1, &(0x7f0000000000)=@raw=[@generic={0x6, 0x9, 0x80000001, 0xdc, 0x1973}], &(0x7f0000000040)='GPL\x00', 0x47d9f7dc, 0xe9, &(0x7f0000000180)=""/233, 0x41100, 0x1, [], r11, 0x2}, 0x48) syz_mount_image$iso9660(&(0x7f0000000a00)='iso9660\x00', &(0x7f0000000a40)='./file0\x00', 0x3, 0x1, &(0x7f0000000ac0)=[{&(0x7f0000000a80)="0ddadbad", 0x4, 0xfffffffffffffff7}], 0x400, &(0x7f0000000b00)={[{@map_off='map=off'}, {@check_relaxed='check=relaxed'}, {@unhide='unhide'}, {@gid={'gid', 0x3d, r7}}, {@overriderock='overriderockperm'}, {@session={'session', 0x3d, 0x5}}, {@mode={'mode'}}, {@map_acorn='map=acorn'}], [{@fowner_gt={'fowner>', r12}}, {@fowner_gt={'fowner>', r12}}]}) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=ANY=[@ANYBLOB="180000000000000000000000000000009520400000000000"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:07:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x468}], 0x1}, 0x0) [ 1650.430481][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1650.437791][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1650.462660][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1650.469816][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1650.480419][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1650.487622][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1650.510135][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1650.517300][ C1] Buffer I/O error on dev loop0, logical block 0, async page read 22:07:52 executing program 2: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x3, 0x2) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000440)={&(0x7f0000000300), 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x60, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x60}, 0x1, 0x0, 0x0, 0x40}, 0x40) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x10001, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e24, @multicast2}}, [0x80000001, 0x8, 0x2, 0x79b0, 0x1, 0x800, 0x400, 0xa3, 0x3, 0x6, 0x0, 0x4, 0x1, 0x9, 0x2]}, &(0x7f0000000140)=0x100) getsockopt$packet_int(r2, 0x107, 0x1f, &(0x7f0000000480), &(0x7f00000004c0)=0x4) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000240)={r3, @in6={{0xa, 0x4e22, 0x5, @mcast1, 0xaf59}}}, &(0x7f0000000180)=0x84) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x100000000000012, 0x0, 0x0, 0x0, 0x0, r2}, 0x2c) [ 1650.533273][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1650.540415][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1650.551824][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1650.559017][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1650.567946][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1650.575116][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1650.584374][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1650.591537][ C1] Buffer I/O error on dev loop0, logical block 0, async page read 22:07:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x48, 0x0) 22:07:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000002ae0c04c9a2afcfcd42f16756892a198ca458b021818b35c9d88609635526faa8f750e1f8da"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 1650.768023][ T1812] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1650.790493][ T1812] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:53 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8, 0x1) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r3, 0x110, 0x4, &(0x7f00000000c0)=0x1, 0x4) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000080)=0x40) close(r2) close(r3) [ 1650.878521][ T1812] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1650.893097][ T1812] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000000540)=ANY=[@ANYBLOB="1800006ad26d4500000000000a00000095000000000000003ac6220f39cf8af781d8d3a658dfcada416274817ddacb485cf2ff0a10c189b41f6c217d3f2f05dbb4f28c4344ad478b06e506c73cc6f5db87ad6f97c90b2f9f171fff8255a16fa608d0433bffcaa367bb29ffc3bbc81c482c0790ad513fb1d48921ceea6eb535c48dea9081323713ea905bf946f40c64d1936b21cd3b43d5dbadc40169040191f9cb2752b5e418dcb39ce705ce7474820200000000000000279b62ddb871fe7b12ca3a34336bc5cb454c4af3a64ed56ea92e7e6d2d57351acafd9e7c14fe8373b471d61953d50bf9b6d8d79a60d16a98548d1d3df50eb41f028d3ab756b070130f23fb35241d92f60a7f0f465fef5da0a1e00bd87a8c7fbd21950d8d5a595ee06a9928b1c1403403e92f83e59258de816093c33855833dd5cee0818e5b14000000000000000000000001004ae10b8c95844df0731bc375cf8a09443fe4a5036d3ec581ddafe112371f2b9c4b54116da70aa92d30fafe8421f7db4fb43d9de090777a409ac3091f186ad8211f0040d1c0df3217caf38600785f78785c4dd40c11dfdedad9e5433d0568058f0a1fa6572e09789203a3ab0000000000974b67f1544d2be81ceb6b726bc48075f1eeef73569948701d750d4cc48ae1"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:07:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x478}], 0x1}, 0x0) 22:07:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:53 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x5, 0x1, &(0x7f0000000100)=[{&(0x7f0000000180)="d1b72971e9375d9f8b0e4f9dc01792579c19516869e7cf28721a50da23338912cc787ac12efcb17ba0fd64735be967d7699cf3bfa5a0af234707ca06046f6d5dddf3f6a24e2243e3da15ffbd090e96428d07fbb92ab604b3e44de1956987d62537308e818bd6052a3e3b633d16d342a55f8002daf8834cdcc9fa79a20ce5b1d8b8d6aa43047baea88c002ce80cdef1f7a6a80e00d57ce9a4039a997783cf61421600ad122fc30ff9c56b4a05528a7770d9c93be657b6200a72e674288c5f4a470df7e697e153f197", 0xc8, 0x40000}], 0x100000, 0x0) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x1ff, 0x6, &(0x7f00000016c0)=[{&(0x7f0000000340)="dc7d63c16089aca50f02356549b3e6ffb915b7a0e1fbe2bd54a0b3fe9839f26d1f4897f4bb6867266a98794dfc5205be25c1d275789279a2c0f03c7f99fbf763745fcf7f160dc4c757c011c796cb427349a108918abb350ce536f2c053c9a22eb4b0a86e76dc84c7e6523422bf2e3ef1405aa7a118c9731133831db6c2c9d090d1983b3398514374a21208c595ce2b13ad13fa18b59a57215e1a07b7e0948154ab091b53a2d2828cbfc85a9c7cfeb535821b8825789b6139055a5b7cd4482fb9b0e2f816d62fe8b6b1078410", 0xcc, 0x70e}, {&(0x7f0000000440)="029d279141361a2ef4202db41eb881fdfa2a211d20fd03b6c4be8e0f330b0adbb55c8cd0e96b5592dc933d9d", 0x2c, 0xfae8}, {&(0x7f0000000480)="6393364c0fb8c92612e61a6e1d6566b18730fadee9877a196b46f4ef3457c4d67af37a66fbd8c441090bacd8356b2f5ed65c5932fe8439a286f7f01fbbce2371dd5101542b89198000c65b75a3615c9e4f27a1913fb1aa259509dd83358844382a3109a9e93972e63ead3bf0583b6c805eba4c40de1bbf346f668d639cec0486eb3cebe0abbc6ebcaa1dbbef63400476116e2877206ee4808c04f4141ebfa86704db891fb20d8bc0ffb0758261167ce05fd9ca34402596bcbb286835bf841280882d7d9a464b80edfc67194533925a165e14dbeef02e890dbc8b83a0018ac482f7f8ef9ad0c0036959b5", 0xea, 0x4665}, {&(0x7f0000000580)="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", 0x1000, 0x80000001}, {&(0x7f0000001580)="5e4ce7ff2ed63c820fe5a8845870276bcf4c634b529cea6e72fc3ba32338b575570ed2ed84e29e2a19053b38a857aff4c486210a811270eb194f9c2ddd048e25a84c764bae7814cbcf1ba7cff46f9bfbf4d0c43e02570b3254fe7a1b254bd8a0b9a7047b3c93a70a9323037e9512a8fa5fbfcf8c364eb15b52f698b69fe5d11970c3787d3ac915a0d7a5caa43ff68b041a714135b2236dbc59bc4194e1bea03a4f40239b0d9f7cc054c829c430498342a838ec36751aef932023e8409b8efcbb1fb0c969", 0xc4, 0x6}, {&(0x7f0000001680)="6ce355b9a1c759bc1d75db935f9f4c", 0xf, 0x3ff}], 0x420, &(0x7f0000001780)={[{@case_sensitive_no='case_sensitive=no'}], [{@dont_hash='dont_hash'}, {@measure='measure'}, {@obj_user={'obj_user', 0x3d, 'mime_type^bdev'}}]}) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB='/dev/nbdM\x00'], &(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='squashfs\x00', 0x0, 0x0) 22:07:53 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x220, 0x0) 22:07:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x4c, 0x0) 22:07:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000180)={r0, r0, 0x48b, 0x85, &(0x7f0000000040)="584f0e07073c50a976469e162514ca6cd23b266bbcdde2ec25ac54e88883580034a578943cab86836fe980b860ca09c58bf66d191d25f2d91149ecf5557941f63b2a9d9c41f65ea456ad43e960bab64053e3387b0932da86bca348a567ecfb254bc2b368fca8cfb2f23c2d927a9ba0d98e42f309eefce99f5fddb78965ecf48ef8c8c929e8", 0x7, 0xd2, 0x80, 0x1, 0x3, 0x2, 0x5, 'syz0\x00'}) 22:07:53 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@mcast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000040)=0xe8) ioprio_get$uid(0x3, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000000)="0a06000000123f3188a070") r2 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r2, 0x84, 0x11, &(0x7f0000dcffe8)=""/24, &(0x7f0000000080)=0x18) 22:07:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x488}], 0x1}, 0x0) 22:07:53 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='lp\x00', 0x3) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x220200, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x4e20, @broadcast}}, 0x0, 0x7f, 0x0, "841aa61aecbfe573c3382766230330a8d2ceed1330add6735c56cd2c313222715985deb3ac5102bdd7f0cdb277ffe61708b02516e26145a3cb3ae9fe4e88080aa8fc6ffbd4cbf85cbe9b9e7d7005b22b"}, 0xd8) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='dctcp\x00', 0x6) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000003980)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}, [0x0, 0xb9, 0x0, 0x0, 0x0, 0x8, 0x10001, 0x0, 0x0, 0x81, 0xffff, 0x1, 0x0, 0x9, 0x9]}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000006ac0)={0x0, 0xca}, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, 0x0, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) prctl$PR_CAPBSET_DROP(0x18, 0x5) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000000c0), &(0x7f0000000100)=0x4) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) ioctl$KVM_PPC_GET_SMMU_INFO(r1, 0x8250aea6, &(0x7f0000000900)=""/4096) 22:07:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) r1 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x2, 0x4180) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x200000e, 0x10, r1, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000340)={0xfff, 0xfbf, &(0x7f00000001c0)="6b57fc7950baa17a12348a473db0cc85c132921def8c7deac00537afea2c25381d10e74abd5708e97d1eb60dfd53652bf091bdadc267c37097254a7704bb05cf0baa20bfa6537aa335d94ceb245449e4aea8401e9c7455791f47a1af633d5dc49243b66e2947bc5a4919992885797f55a30b16fed7acea6b47efe537578bb62b3c05ba076c8d587d373059c9240cdae2d35bc5bb9ab42bd3215b6d67e6825670436af494dd98b1374a0b", &(0x7f0000000280)="8928b1a82318bbad858bb69389f84bf406a5dfb9fe6a1afa11b7204cb4880744341342eaae2cb45d1aaa9f88e2da2420768cf5493a70521fecbf2ec0fc03ccc0dba7b46d97d7e17f62b3e9fa80bd6da168e530c1504b5994bc6156cee9f8c5579ed9ae0a3561c2044727ba9738276358879dc2da3b748959192a192bb763db0597700f98d7c6279da18f83f2b0f93cc9a09c0a93dc8de3f9851b2b6d40f4fc6941e89749a74bfa4de846839132c3ec4a020cd2499b9ccf17653e7f6119", 0xaa, 0xbd}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x2, 0x30}, &(0x7f00000000c0)=0xc) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000040)={0x1, 0x8, [@dev={[], 0x21}, @empty, @dev={[], 0x1a}, @random="fd64a7de30b5", @empty, @dev={[], 0x22}, @remote, @local]}) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000100)={r3, 0x3ff, 0x30}, 0xc) [ 1651.418308][ T2076] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1651.450085][ T2076] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:54 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x4004c2, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000200), 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") sendto(r1, &(0x7f00000000c0)="1568822a1f908223fabd92f8ed296fbb44ee93b45bf16cdaa2be9cd153502fcc3015460a663ce7bf9bbd9267db34810f9bd34b50ce375bdef934b497c8398278d67a4c4dbcd3ddaef432c98bf4120cfedddda440cd4b091e99a942ade208838f05b5e6a702113a80d2eacc4f02f8e4a3df", 0x71, 0x0, &(0x7f0000000240)=@rc={0x1f, {0x6, 0x100, 0x3, 0x4, 0xffffffff00000000, 0xffff}}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x20, 0x0) getsockopt$inet6_dccp_int(r2, 0x21, 0xf091711e827ada7e, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 1651.535384][ T2076] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1651.556184][ T2076] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x60, 0x0) 22:07:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x6, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x2003f, 0x0) write$FUSE_INIT(r1, &(0x7f0000000240)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x40, 0x20, 0x8, 0x3, 0x100000000, 0x4}}, 0x50) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1, 0x800) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x50, r3, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xe7}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_IPPROTO={0x8}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x50}, 0x1, 0x0, 0x0, 0x8801}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=ANY=[@ANYBLOB="1800000000000000100000f4000000009500000000000000"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:07:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x10}], 0x1}, 0x0) 22:07:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x498}], 0x1}, 0x0) 22:07:54 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x221, 0x0) 22:07:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x68, 0x0) 22:07:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x800000000000000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000000)={0x80000000}) 22:07:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x4a8}], 0x1}, 0x0) 22:07:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x5, 0x40000) connect$x25(r1, &(0x7f0000000040)={0x9, @null=' \x00'}, 0x12) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:07:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000180)={0x0, 0xffffff5b, &(0x7f00000017c0)={&(0x7f00000000c0)={0x472, r2, 0x51d, 0x70bd26, 0x25dfdbfc, {0x3}, [@TIPC_NLA_MEDIA={0x0, 0x5, [@TIPC_NLA_MEDIA_NAME={0x0, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x0, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x0, 0x2, [@TIPC_NLA_PROP_PRIO={0x0, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x0, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x0, 0x4, 0x7fffffff}]}]}]}, 0x30}}, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x4, 0x100) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f0000000080)=0x1) 22:07:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf00512cb9c97b64226b7cda8bd329636d6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x400}], 0x6c, 0x0) 22:07:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000000, 0x0, 0x8, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x5, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x2000000000010d, 0x4000800000000b, &(0x7f0000000280)='\a\x00\x00\x00', 0x4) 22:07:54 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x80010001, 0x109402) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{}, {}, {}, {}]}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={0x6}, 0x8, 0x800) ioctl$FICLONE(r0, 0x40049409, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, 0xffffffffffffffff) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x3, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0xfffffffffffffffe}, 0x48) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video2\x00', 0x2, 0x0) delete_module(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0xa00) 22:07:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) lsetxattr$security_evm(0x0, &(0x7f00000000c0)='security.evm\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000300)={0xffffffffffffffff}, 0x80000) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000340)=0x1) listen(r0, 0x20002) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x37, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) r5 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f00000001c0)={{0x0, 0x4, 0x0, 0x101, '\x00', 0x400}, 0x2, 0x2, 0x6, r5, 0x8, 0x2, 'syz0\x00', &(0x7f0000000100)=['GPL\x00', '@\x00', 'em1wlan0em0em0#keyringbdevwlan1%.GPLwlan1\x00', '#em0/^-vmnet0$wlan1-procvmnet0&&/vboxnet0\x00', 'security.evm\x00', '-em1posix_acl_accessmime_type\x00', 'security.evm\x00', 'security.evm\x00'], 0x9f, [], [0x7f, 0x0, 0x4, 0x5]}) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x68) [ 1652.582715][ C0] net_ratelimit: 23 callbacks suppressed [ 1652.582722][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1652.588580][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:07:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x3c6}], 0x1}, 0x0) 22:07:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x74, 0x0) 22:07:55 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x222, 0x0) 22:07:55 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x84040, 0x0) mknod$loop(&(0x7f0000000240)='./file0\x00', 0x8010, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x800, 0x4d9, 0x2, 0x8, 0x7}, 0x14) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$update(0x2, r1, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7f, 0x2) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x1) ioctl(r0, 0x100000890e, &(0x7f0000000200)="21a5d5478a41a427e11bba5e87cc8f12b3693328de2cbae66c14c0f345b82814ebf4af6d0a5b0e") stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000340)={0x3, @bcast, r3}) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x1ac, &(0x7f0000000000)=ANY=[@ANYBLOB="5d3f28d9d507484780000000000000009500000100000040"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f00000000c0)=0x5) ioctl$DRM_IOCTL_CONTROL(r2, 0x40086414, &(0x7f0000000080)={0x0, 0xfffffffffffffffe}) 22:07:55 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x10307c, 0x0) ioctl$IMHOLD_L1(r0, 0x80044948, &(0x7f0000000080)=0x9) r1 = socket$inet(0x2, 0x80f, 0x0) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x0, 0x64031, 0xffffffffffffffff, 0x0) fallocate(r1, 0x3, 0x1, 0x100) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000000)='D', 0x1) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) 22:07:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x4b8}], 0x1}, 0x0) 22:07:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x7a, 0x0) 22:07:55 executing program 2: r0 = gettid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) r2 = socket$vsock_dgram(0x28, 0x2, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) kcmp(r0, r1, 0x6, r2, r3) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='status\x00') exit(0x0) pread64(r4, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r4, 0xc010640c, &(0x7f00000000c0)={0x3, 0x75}) 22:07:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x62, 0x100) r2 = geteuid() dup3(r0, r0, 0x80000) getresgid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f0000000180)) recvfrom$rose(r1, &(0x7f0000000840)=""/215, 0xff90, 0x25, 0x0, 0xfffffffffffffd1d) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xd4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000380)=0xffffffffffffff51) mount$9p_tcp(&(0x7f0000000480)='127.0.0.1\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x1000000, &(0x7f0000000540)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@cachetag={'cachetag'}}], [{@smackfsroot={'smackfsroot'}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@euid_eq={'euid', 0x3d, r2}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@dont_measure='dont_measure'}, {@dont_measure='dont_measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, '+'}}, {@dont_measure='dont_measure'}, {@measure='measure'}]}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x20002, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000070000,user_id=', @ANYRESDEC=r2, @ANYBLOB="2c670600000000000000fe2090cf0480f097205958d12feb92c61095c9ea6b1a6160a71b45d1667eda3e1141ff976f0da1b712bf65eb1a7a3f3e8f", @ANYRESDEC=r3, @ANYBLOB=',allow_other,pcr=00000000000000000018,uid<', @ANYRESDEC=r4, @ANYBLOB=',audit,fowner=', @ANYRESDEC=r5, @ANYBLOB=',\x00']) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") [ 1653.222732][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1653.222769][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1653.228665][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1653.234337][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1653.234382][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:07:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x300, 0x0) 22:07:55 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3, 0x80000) fsetxattr(r0, &(0x7f0000000040)=@known='system.posix_acl_access\x00', &(0x7f0000000080)='^!userwlan0\x00', 0xc, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f00000000c0)={0x3, 0x1}) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 1653.350330][ T2778] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1653.366055][ T2778] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x4c8}], 0x1}, 0x0) [ 1653.439238][ T2778] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1653.451949][ T2778] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0xa00}], 0x1}, 0x0) 22:07:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00000000c0)='\"\a\xc1SY\x89\x83\x06\x00\xff\x9b\xcd\x00\x00\x00\x00\x18\x00\x00\x00\x00\x00\x00\x00', 0x800a, 0x598, &(0x7f000062b000)=""/4096}, 0xffffffffffffffd8) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x401, 0x2000) bind$nfc_llcp(r1, &(0x7f0000000180)={0x27, 0x1, 0x0, 0x7, 0x9, 0x7, "95b3d5cbd2eb3e8978f265be2002cdfd38ceb9d754887991169be1c9ff28ca466bd0cc319ea7880b277a82e1663488b30c7d3e72e13eb6c9585c43b18edf9b", 0x20}, 0x60) ioctl$VIDIOC_TRY_DECODER_CMD(r1, 0xc0485661, &(0x7f0000000040)={0x4, 0x1, @start={0x101, 0x1}}) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000100)=0x7004) [ 1653.862707][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1653.862731][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1653.868536][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:07:56 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x223, 0x0) 22:07:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf00512cb9c97b64226b7cda8bd329636d6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x400}], 0x500, 0x0) 22:07:56 executing program 3: r0 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000180)={0x7, 0x1, 'client0\x00', 0xffffffff80000007, "cf2e69ae220048ea", "2b1e6bfef2a8711574bd7703583366b8c0b68837d7f14ca9a1676c2dfebcb64a", 0x9d, 0x1}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0xfd48, 0x440) write$UHID_GET_REPORT_REPLY(r2, &(0x7f00000000c0)={0xa, 0x3, 0x6, 0x5}, 0xa) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xfffffffffffffffc, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r3, 0xc0305615, &(0x7f0000000040)={0x0, {0x0, 0x1}}) 22:07:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x4d8}], 0x1}, 0x0) 22:07:56 executing program 2: 22:07:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x40000) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000040)={0x0, 0xed, "bedd2c48901c669fa0896bb7ebd060ae249697d9a6c88f2d572df9e43fe2562e21d52fd7c625d4e57fc9807ce2669453caeb54aeedc53c6e633a57f9b0d95e9a436b0ea16591b9360d95c7f37ebf67b951aa51d8ca502b80b19531e9182bbc7166749cc2ddc440447b01ba08825c93d0e821e86c0a14447b2d870e85413097dbf6a015d4e24298bfa92b4c79bd684b8ec68be24a1ccf48fc62cf4a5a312b93f8c1d6980646e7fc66434b87007e6d3a576c8734a8b0a942ce60423587c467e61c8ba3a58d315465e7039f7cb3d04cfc8651e78daf8fdddc656c725effb3b40ebedf7fa2635e0f48a8b8b214edb8"}, &(0x7f0000000180)=0xf5) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000001c0)={r2, 0x400000000401}, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x1f, 0x3, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 1654.048898][ T3080] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1654.068729][ T3080] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:56 executing program 2: [ 1654.159432][ T3080] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode 22:07:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) r2 = fcntl$dupfd(r0, 0x406, r1) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000002440)={0x0, 0x40, 0x10, 0x80000001, 0x9}, &(0x7f0000002480)=0x18) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000024c0)=@sack_info={r3, 0x9, 0x89}, 0xc) 22:07:56 executing program 2: [ 1654.208269][ T3080] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x600, 0x0) [ 1654.350646][ T3185] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1654.362010][ T3185] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0xa10}], 0x1}, 0x0) 22:07:56 executing program 2: [ 1654.420608][ T3185] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1654.438937][ T3185] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:57 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x224, 0x0) 22:07:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x22000}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0xf4, r2, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0xe0, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff80000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffc}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xea90}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}]}]}, 0xf4}}, 0x40) 22:07:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x4e8}], 0x1}, 0x0) 22:07:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf00512cb9c97b64226b7cda8bd329636d6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x400}], 0x700, 0x0) 22:07:57 executing program 2: 22:07:57 executing program 2: [ 1654.928133][ T3386] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1654.938137][ T3386] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f023c123f3188a070") r1 = open(&(0x7f0000000000)='./file0\x00', 0x242, 0x122) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x3) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000080)=0x7fff, 0x4) r2 = socket$netlink(0x10, 0x3, 0xf) writev(r2, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) socket$inet_sctp(0x2, 0x1, 0x84) 22:07:57 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x201607, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000340)={0x0, @raw_data="609e653d9f5f31db0a9a420dd804f6f46e612af9b084dbef1510cd15189829969cbef658763336238a3a92c8d37ca488f605ff26d474434fe70ac6fa572b7ed3b2d6fedc0d55dae24f2f6c3739979817c12c45dbd15d4e77f922c085981eb5eaa01200d1e9465f40d7a4c0e7d8906e01f236918f76ad79a8880bee6fe06a987777f51570c68c3f425e7b27fd9c5b5a5da5fa37659b16e06c873f32bc634705a29062cbd7e261e7c1ca5821262cd71caa8746f86982d55e08e9426ec2da72e0b0b6f3e3a2dcb2ed30"}) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0xe0, r1, 0x200, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1f}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x18, 0x10}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x2}}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x30}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x30}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x100}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x81}]}]}, 0xe0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") connect$netlink(r0, &(0x7f0000000000)=@unspec, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=ANY=[@ANYBLOB="180000000000000000950000000000000000000000000000"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:07:57 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x353, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000100)={{0x2}, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], {0x0, 0x989680}}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x20800, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000600)={0x28, 0x4, 0x0, {0x6}}, 0x28) fcntl$setsig(r0, 0xa, 0x3f) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x101, 0x4001) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000640)=0x1) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000040)={0x30, 0x4, 0x0, {0x2, 0x7, 0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x30) [ 1655.027243][ T3386] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1655.048593][ T3386] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf00512cb9c97b64226b7cda8bd329636d6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x400}], 0x900, 0x0) [ 1655.210196][ T3454] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1655.227057][ T3454] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0xc40}], 0x1}, 0x0) 22:07:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2, &(0x7f0000000040)="0adc1f023c123f3188a070") ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000000)={0x6, 0x8, 0x1, "8966435a54d341ec30d43fbf8ed712622adf461e3650551e0b9b3b00e9e82315", 0x41495043}) socket$inet_udplite(0x2, 0x2, 0x88) [ 1655.276638][ T3454] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1655.289332][ T3454] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1655.417844][ C0] print_req_error: 539 callbacks suppressed [ 1655.417855][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1655.431237][ C0] buffer_io_error: 539 callbacks suppressed [ 1655.431246][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1655.446498][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1655.453851][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1655.461938][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1655.469197][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1655.478152][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1655.485436][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1655.494147][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1655.501360][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1655.509586][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1655.516775][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1655.524840][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1655.531958][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1655.540451][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1655.547581][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1655.555677][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1655.562814][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1655.570794][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1655.577935][ C1] Buffer I/O error on dev loop0, logical block 0, async page read 22:07:58 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x225, 0x0) 22:07:58 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x803, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'ip6tnl0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmmsg$inet_sctp(r0, &(0x7f0000000040), 0x0, 0x0) 22:07:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x4f8}], 0x1}, 0x0) 22:07:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0xa00, 0x0) 22:07:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = gettid() sched_setaffinity(r1, 0x8, &(0x7f0000000000)=0x7e52) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 1655.782608][ T3635] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1655.799500][ T3635] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 1655.848735][ T3635] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1655.887489][ T3635] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:07:58 executing program 2: mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000500)='overlay\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="75707065726469723d2e2f668c6cfcc5fe19712afbaa5e794f0c72696c65302c6c6f0500726469723d2e3a66696c65302c7f0800063a6a23c484c50dc13c32831c14ea7b8e8839c927e919812c8bc1b8c01754405844dd4b03598276bcf137f2d9900d8696a57ee4ed823e475583c053c470846f19fc9fdf5e1ff9916285d9cf66b9d54228b312219e49447889740be9f5e18833c2c6df87a070890731ae02918c6ded9555"]) rename(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/file1/file0\x00') writev(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in=@multicast1, @in6=@local}}, {{@in=@local}, 0x0, @in6=@remote}}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0, 0x0) connect$pptp(r0, &(0x7f0000000140)={0x18, 0x2, {0x1, @empty}}, 0x1e) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, 0x0) geteuid() getgroups(0x2, &(0x7f0000000680)=[0xee00, 0xee00]) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) fsetxattr$system_posix_acl(r1, 0x0, &(0x7f00000006c0)={{}, {0x1, 0x6}, [{0x2, 0x6}, {0x2, 0x4}], {}, [{}, {}], {0x10, 0x3}, {0x20, 0x6}}, 0x44, 0x2) 22:07:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x10c00, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002840)=0x14) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000002880)={r2, 0x1, 0x6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:07:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf00512cb9c97b64226b7cda8bd329636d6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x400}], 0x1020, 0x0) 22:07:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000080), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 1656.028522][ T3715] overlayfs: unrecognized mount option "lo" or missing value [ 1656.070394][ T3770] overlayfs: unrecognized mount option "lo" or missing value 22:07:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x2000, 0x0) 22:07:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x508}], 0x1}, 0x0) 22:07:59 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x226, 0x0) 22:07:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0xf00}], 0x1}, 0x0) 22:07:59 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="f2"], 0x1) 22:07:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="1adc1ffadd3916ea749191") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="1800008fc481c916c236eecc000000000000000000000000009500000000000000"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:07:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x518}], 0x1}, 0x0) 22:07:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf00512cb9c97b64226b7cda8bd329636d6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x400}], 0x2010, 0x0) 22:07:59 executing program 2: getpid() clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x10000, 0x0) ioctl$SIOCRSACCEPT(r0, 0x89e3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc0000000000030006000000000002000000e0000054d81458186fe8b9000200010000001d000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) exit(0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2f, &(0x7f0000000580), 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x0) 22:07:59 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000040)={0x9, 0x0, 0x6d67, 0x80000000, 0x1000, 0x28, 0x11, "dd6cdf9bd4107d87e0625efd9d0a6c2cc1166394", "2d3d4908cfbdfe369a4450a6ed600a4bf316ea7a"}) read$eventfd(r0, &(0x7f0000000080), 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:07:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x2300, 0x0) 22:07:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x800, 0x0) sendfile(r1, r1, &(0x7f0000000080), 0xb3) write$P9_RRENAME(r1, &(0x7f0000000040)={0x7, 0x15, 0x1}, 0x7) 22:07:59 executing program 2: r0 = memfd_create(&(0x7f00000000c0)='md5sumGPL\x00', 0x4) fcntl$setstatus(r0, 0x4, 0x40400) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x45011, r0, 0x0) r1 = dup(r0) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000040)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000080)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000100)={r2, r3, 0x2}) bind$rds(r1, &(0x7f0000000000)={0x2, 0x4e23, @rand_addr=0xaf}, 0x10) 22:07:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x3, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800b, 0x1000, &(0x7f000062b000)=""/4096}, 0xfffffffffffffe65) 22:07:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x2d00, 0x0) 22:07:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x100000000000012, 0x1ff, 0xfffffffffffffffd, 0x4000000000000, 0x20, 0x1, 0x10001}, 0x2c) 22:07:59 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x227, 0x0) 22:07:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x401, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000040)={0x5, 0x3, 0x100000001, 'queue0\x00', 0x100000000}) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:07:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x528}], 0x1}, 0x0) 22:07:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0xff6}], 0x1}, 0x0) [ 1657.543051][ T4364] QAT: Invalid ioctl 22:08:00 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0x2000000000008040, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:gpg_helper_exec_t:s0\x00', 0x27, 0x3) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) truncate(&(0x7f00000000c0)='./file0\x00', 0x0) fcntl$setlease(r0, 0x400, 0x2) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) 22:08:00 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x27fd, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff1000/0x2000)=nil, &(0x7f0000ff3000/0x3000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ff6000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000040)="2f89221b6247e5c11f36307d744a49745865c5084591ea2982a1d6b8ff1aab3bb9cc402ebb519e1a87", 0x29, r0}, 0x68) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") fanotify_init(0x20, 0x181000) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 1657.581629][ T4373] QAT: Invalid ioctl 22:08:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf00512cb9c97b64226b7cda8bd329636d6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x400}], 0x2d52, 0x0) 22:08:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:08:00 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0x2000000000008040, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:gpg_helper_exec_t:s0\x00', 0x27, 0x3) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) truncate(&(0x7f00000000c0)='./file0\x00', 0x0) fcntl$setlease(r0, 0x400, 0x2) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) 22:08:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x3f00, 0x0) 22:08:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008914, &(0x7f0000000040)="0a0000416bd706d114789ae9ffb7ce898314ce8c91e81aa0d91580e17006e93d8ee6af503c06b12d8986d0303d00ce09f24b0f99bf6ccd2191c256a75fba32e4cab9348b6711bfc0b7d9b2599ff878cc37043ed5da37fb13e1a9f4c0c72ce1cb680a754be2cc56863f9e3bfcb65517321c879a75ac541867ef143b471e6dad62c131d0768ec845be") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=ANY=[@ANYBLOB="180000110000000000000000000000009500000000000000"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:08:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x538}], 0x1}, 0x0) [ 1658.022710][ C1] net_ratelimit: 20 callbacks suppressed [ 1658.022718][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1658.022747][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1658.028432][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1658.046231][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:08:00 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x228, 0x0) 22:08:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x20000, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) sendmsg$nl_generic(r1, &(0x7f00000013c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180200}, 0xc, &(0x7f0000001380)={&(0x7f0000000180)={0x11cc, 0x41, 0x300, 0x70bd26, 0x25dfdbfc, {0x1}, [@nested={0x11b8, 0x4a, [@generic="61a33118e88ed84073e4772de33b30f720bdb815fe68978e09f07d5cadee41ee3194e65bcc2c98c2f6bc26a1001ca2bf53d6e91b0b3722cff79709a32514878cd4f5388f441abfa3f47ba1d9caadf21d8ac5f498102935a958abd603153769cd2a4cd2034e44f541f5733b742f622c2719cde5c3c301", @typed={0x8, 0x6, @pid=r2}, @typed={0x4, 0x32}, @generic="b1ae22f896cb712532dbab6335b02d5b1531ac318228ed543932ccb778da2283a369c131037ef89afc59e2741647e0a4516329e1b022e2e8a4bc343c7156fe9f36432e4a2c02f43ca606a82d4f41c278e707460c2be3ac72fb558aa05701066d", @typed={0xc, 0x6a, @u64=0x6}, @typed={0x4, 0x62}, @generic="23a79df2f8e59765589ee9256d85076d0952051ac4188fc0ad99aebd4ae07c9c7f1b38f9b953b913ce00bbcefc5e4d4fb5531075f8aa2e921d85cf08475401d604f74f8f0b86c1d1271869e9ee8d22dc27b597c4ab55adc43df22a73b0ec97f935c57f156bd0beb9f98acffe809ce0e9c23c14d86b88fe497de5bd1ceef6bdcc11415982ef9631300d33c1e9336ad5bccb96356c2007ec19bfe1b94da409622c894000d6713c3e7decd123776abd2bd4040269c5c0cf7b013429a08dc70446", @generic="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"]}]}, 0x11cc}}, 0x20000000) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000f507dec1c4d235b14de5acf85ecb676f8a480cac5af9f926c93d403d263df506a90112b916e79a9232f65d84de0f08bedb4ad84595a8e4bc3261ba64946a52fc187370138e0a58d488e3"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:08:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x30000, &(0x7f0000000100)={&(0x7f0000000000)={0x2c, 0x35, 0x829, 0x0, 0x0, {0x2801, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x14, 0x1, @ipv6=@loopback={0xfeffffff00000000}}]}]}, 0x2c}}, 0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x3}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000, 0x14b) statx(r1, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x0, &(0x7f00000001c0)) 22:08:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x4000, 0x0) 22:08:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x548}], 0x1}, 0x0) 22:08:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1002}], 0x1}, 0x0) 22:08:00 executing program 2: mremap(&(0x7f0000115000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f000048c000/0x1000)=nil) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x100, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x46000, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0xb, &(0x7f00000000c0)=0x7, 0x4) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x1ffc00}], 0x1, 0x0) 22:08:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") times(&(0x7f0000000040)) r1 = getpgid(0xffffffffffffffff) ptrace$peek(0x3, r1, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 1658.447579][ T4740] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1658.477138][ T4740] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1658.576440][ T4740] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1658.588662][ T4740] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:08:01 executing program 2: mkdir(&(0x7f0000001340)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0xbe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x569b00, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000020701000e002f6465762f75626910e44ece4ae3423eee1f0037b3d186175f000000000000000000"], 0x1b) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x10000, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000002c40)='/dev/dlm-control\x00', 0xfffffffffffffffe, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x201, 0x8000000100079) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(0xffffffffffffffff, 0x8108551b, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x80045510, 0x0) 22:08:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x4800, 0x0) 22:08:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x600000) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000040)=0xcd5, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:08:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x10}) [ 1658.763769][ T4871] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1658.788025][ T4871] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1658.822756][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1658.828763][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1658.914724][ T4871] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1658.930211][ T4871] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:08:01 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x229, 0x0) 22:08:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/audio\x00', 0x0, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000001200)) ioctl(r0, 0x0, &(0x7f0000000140)="0adc1f023c923f3188a070") r2 = bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000000)=0x9d) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x3c9) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x90000, 0x0) ioctl$RNDADDENTROPY(r3, 0x40085203, &(0x7f0000001300)=ANY=[@ANYBLOB="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"]) recvfrom$rxrpc(r3, &(0x7f0000000080)=""/102, 0x66, 0x1, &(0x7f0000000100)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e23, 0x81, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}}, 0x24) lseek(r3, 0x0, 0x3) socket$inet(0x2, 0x800, 0xffffffff) getsockname$packet(r1, &(0x7f0000001240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001280)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f00000012c0)={'team0\x00', r4}) 22:08:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001540)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000000c0)={0x7b, 0x0, [0x80000001, 0x1]}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x80000, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:08:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x558}], 0x1}, 0x0) 22:08:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x4c00, 0x0) 22:08:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1008}], 0x1}, 0x0) [ 1659.334540][ T4998] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1659.344945][ T4998] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:08:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008916, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x80000, 0x0) ioctl$IMGETVERSION(r1, 0x80044942, &(0x7f0000000180)) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="180200000000000000000000eb3af4c9a9cf2bb59c87f23f6522e3cb668e530a819d4a483ed7e03fa5273f14ccab50bad83df8e8b7f7314ee6631a220e7f565c201803ac1b4cac99c9da2261fe758929b2749e684ec0aa799994b415ed4b958ef27351238f7bdcd84398ff2c4e89b147dd93f2badd3bf10d09ea2525763168ca43b6bb267dda03c8d205ab373bc9a08a1c9618727dc596a6b11b9c49788f6c18fb4b557197594a4e107a16b99ccd77c0ac1ffa75ab1c50a961afd57e64e8081f2c8e75285c1079e270cc716bfc550d1dca7262e5aa0c57ec9986b6ac926b96f7b4d19dff74fbe321ec9fb09c3a59e6c8b5036c3ba484636adb1e4e2cecbc827c"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 1659.411605][ T4998] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1659.448464][ T4998] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:08:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) poll(&(0x7f0000000080)=[{r1}, {r1, 0x400}, {r0}], 0x3, 0x0) 22:08:02 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x101000, 0x0) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x29) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=ANY=[@ANYBLOB="180000000000000000000000000000009500001000010000"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:08:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x522d, 0x0) 22:08:02 executing program 2: memfd_create(&(0x7f0000000340)='keyringpp\x840vboxnet0B\x00\xcd\xc2\xdczm\xc4\x87\xebD@\xfc\x14\\\xb2\xa8\xa41l{\xc8\x9a\xae\xf5\xf9>\xd7\xcd>\xdd\xfd\xe28u\x18\xc8N\x85\x8a\xae\x9b\x12\xce\xa9\xac&\xf3}\xc20\xa5\xf2\xedP_\xa1\xf6l\x9d\x8c\xef\n\x1f\x9c\xf6\x15\x05\xf6\xcf\x15\x1eDD{B\xa4\xea\xf6&\xb9]\x8ee\a\xd8\x14XK\xf7\xed\xbd\x96\xff\xb0\xd14S]\x97w\x92\xb9\x8f\xdbx`\xb3\xfc\f\xeaR\xedC\xd90=\x85\xed\xc1\xe1\xcdq?\x95\xeeb\x8a\xea\xf5\x98d\x8c\xeb\r\x0f\x1f\xb0\xae\r\xb4%\x9d\n\xb5t\xe3w\xd4\xba\x7f\xae\xf4\xbe\xcd\xe2\x0fus\x97*\x86@\x91\xc3@0M\xdc\x14F\xd8\x86a2\xc7\xc1\x06\xff\xb7\xa3\xe6l\xfcq\x04M}{\xc5\xcb\x1d\"k\xf1g\xfc\x9b\x01\x0f>\xc9\x01\xa9^\xf5\xf6\xaf\xa0\xbe\xbf)\xbd\xed\xbb\x840x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) 22:08:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1008}], 0x1}, 0x0) 22:08:02 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x22a, 0x0) 22:08:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000002956c200000000000ac71b5aac81bacf4bd1912da7d873cd170abee6cc954c61152594e220417bd9c3f6a6692ee24"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc0585604, &(0x7f0000000040)={0x0, 0x0, {0x3, 0x4, 0x200a, 0x3, 0x8, 0xf, 0x2, 0x3}}) 22:08:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x6000, 0x0) 22:08:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1010}], 0x1}, 0x0) 22:08:02 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x1c) write(r0, &(0x7f0000000240)="abdb678009b54aa398cb3c4578df54ffbfa24ab473457bfe09658d803ec8965e0358159ecb87c0617838d6d5006594755c4e69c6c03499f7c063e80a288589042bfef27b0a452d08df4f45a49d9421966ad359210f4bf536e8fab01e27fb8f3d1e89b00bf6077cfcd9e1cc32a7ad6106b6583d04807541553e988a5911e04d7821919e324c6a3e17776815af40ca795278ecb664120dff5463321c77230f87498a07a4abc0892580cbb007b93b4f88cd08116a9c2c5ea7a094f03c070a9cfa1f699573520ca41118033fb30370f44bde037ed68c37932a4eacba1614c51ae8b8ed754b7d0f", 0xe5) syz_extract_tcp_res$synack(&(0x7f0000000340), 0x1, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000140)={@mcast1, 0x0}, &(0x7f0000000180)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000030c0)={{{@in6=@mcast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in=@dev}}, &(0x7f00000031c0)=0xe8) sendmsg$nl_route(r0, &(0x7f00000032c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000003280)={&(0x7f0000003200)=@ipv4_getnetconf={0x54, 0x52, 0x700, 0x70bd27, 0x25dfdbfd, {}, [@IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x40}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x80000000}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xb8}, @NETCONFA_FORWARDING={0x8, 0x2, 0x10001}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x5}, @NETCONFA_IFINDEX={0x8, 0x1, r1}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x10001}]}, 0x54}, 0x1, 0x0, 0x0, 0x4040000}, 0x40) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f00000003c0)=""/64) socket$inet6(0xa, 0x2, 0x2713) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000380)={0x200, 0xe5, 0x0, 0x3fc, 0x80000001, 0x5}) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f00000001c0)={0xfffffffffffffffe}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="f0000000100013070000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="f0000000000000000000ffffffffffff000000003200000000000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000"], 0xf0}}, 0x0) 22:08:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x100f}], 0x1}, 0x0) 22:08:02 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getdents(r1, &(0x7f0000000280)=""/135, 0x74f) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x803, 0x0) r2 = socket$inet(0x2, 0x0, 0x0) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, 0x3, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x23a) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000600)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)={0x68, r3, 0x400, 0x70bd2c, 0x25dfdbfd, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0xc0, @media='udp\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x200400d4}, 0x44000) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000440)='scalable\x00', 0x9) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) perf_event_open(&(0x7f00000003c0)={0x3, 0x70, 0x70, 0x8, 0x0, 0x7, 0x0, 0x4, 0x2, 0x0, 0x2, 0x0, 0x1000, 0x4, 0x10001, 0x9, 0x1, 0x10000, 0x10000, 0x5, 0xfbc0000000000000, 0x1, 0x1f, 0x1, 0x100, 0x7, 0x8, 0x6, 0x1000, 0x0, 0x2400000000000, 0x7, 0x1, 0x8, 0x9a3, 0x4, 0xaadf, 0x800, 0x0, 0x100000000, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x800, 0x7, 0x6, 0x7, 0x682ce1de, 0x0, 0x100000000}, r4, 0x6, r0, 0xa) dup3(r2, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000680)={0x1, &(0x7f0000000640)=[{0xfff, 0x8, 0x0, 0x2ee00000000}]}) 22:08:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") signalfd(r0, &(0x7f0000000000)={0x48a}, 0x8) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x141080, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x7, 0x10, 0x7fffffff, 0x800}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000100)={r2, 0xff, 0x9, 0x4}, &(0x7f0000000180)=0x10) socket$caif_stream(0x25, 0x1, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:08:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x6800, 0x0) 22:08:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000080)={0x9, 0x17, 0x0, 0x9, "29540d0f3a1749d4c61150bef048a3224e18f61f8fa8c9ed90bcff7daa5dcf8a"}) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="19000000000000e27ee51e26d0ebf1b985000000000000004aafdb456ed96ecef259f60904b420e74390362dff528c498fc4bf92bb59ab20a8f7ec887f24d375fe3a197a9f5a"], &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 1660.471598][ T26] kauditd_printk_skb: 59 callbacks suppressed [ 1660.471611][ T26] audit: type=1326 audit(1550354882.897:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5474 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45ac8a code=0x0 22:08:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf00512cb9c97b64226b7cda8bd329636d6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x400}], 0x6c00, 0x0) 22:08:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x5802}], 0x1}, 0x0) [ 1660.699751][ C0] print_req_error: 539 callbacks suppressed [ 1660.699762][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1660.713157][ C0] buffer_io_error: 539 callbacks suppressed [ 1660.713166][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1660.727536][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1660.734861][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1660.749137][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1660.756461][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1660.765795][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1660.773135][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1660.787350][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1660.794630][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1660.803110][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1660.810389][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1660.824482][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1660.831767][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1660.840012][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1660.847309][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1660.860216][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1660.867525][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 1660.876799][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1660.884105][ C0] Buffer I/O error on dev loop0, logical block 0, async page read 22:08:03 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x22b, 0x0) 22:08:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x3, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800c, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 22:08:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x7400, 0x0) 22:08:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x20003000}], 0x1}, 0x0) 22:08:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1010}], 0x1}, 0x0) 22:08:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400000, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f0000000080)={0x0, 0x0, 0x4, [], &(0x7f0000000040)=0xffff}) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x3, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x1}, 0x48) 22:08:03 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x2100, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$audion(0x0, 0x0, 0x202001) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x10000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCSTI(r0, 0x40186f40, 0x712000) 22:08:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x7a00, 0x0) 22:08:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x2, 0xfa3d, 0xff}) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x3, &(0x7f0000519fa8)=@framed, &(0x7f0000002180)='GPL\x00', 0x800a, 0x1000, &(0x7f0000001180)=""/4096, 0x41f00}, 0x48) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x0, 0x800) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f00000000c0)={0x80, 0x0, 0x4, 0x9, 0x0, 0x9}) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7f, 0x80000) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000040)={0x7, 0x1, 0x1000, 0xb3ff}, 0x10) [ 1661.335511][ T5845] ubi0: attaching mtd0 [ 1661.357461][ T5845] ubi0: scanning is finished [ 1661.362744][ T5845] ubi0: empty MTD device detected 22:08:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x7ed4, 0x0) 22:08:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800010}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xc4, r2, 0x120, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8000}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x800000000000000}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x1d}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7fffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8000}, @IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bridge\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nr0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x4000000}, 0x88c1) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 1661.556134][ T5845] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 1661.590558][ T5845] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes 22:08:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffff9c, 0xc008640a, &(0x7f0000000040)={r2, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000080)={r2, r3}) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x2, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 1661.609262][ T5845] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 1661.626469][ T5845] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 1661.634343][ T5845] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 1661.650934][ T5845] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 1661.692387][ T5845] ubi0: max/mean erase counter: 0/0, WL threshold: 4096, image sequence number: 942755056 [ 1661.720546][ T5845] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 1661.759454][ T5858] ubi0: background thread "ubi_bgt0d" started, PID 5858 [ 1661.778972][ T5869] ubi: mtd0 is already attached to ubi0 22:08:04 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x22c, 0x0) 22:08:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0xd47e, 0x0) 22:08:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400000, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f0000000080)={0x0, 0x0, 0x4, [], &(0x7f0000000040)=0xffff}) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x3, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x1}, 0x48) 22:08:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x200033c0}], 0x1}, 0x0) 22:08:04 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x2100, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$audion(0x0, 0x0, 0x202001) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x10000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCSTI(r0, 0x40186f40, 0x712000) 22:08:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x3a0c}], 0x1}, 0x0) 22:08:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400000, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f0000000080)={0x0, 0x0, 0x4, [], &(0x7f0000000040)=0xffff}) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0xd, 0x3, &(0x7f0000519fa8)=@framed, &(0x7f00005fc000)='GPL\x00', 0x800a, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x1}, 0x48) 22:08:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0xedc0, 0x0) 22:08:04 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(0x0, 0x8c, 0xfffffffffffffffc, 0x0, 0x0, 0x2) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000005d40)='/proc/self/net/pfkey\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000076c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007700)=0x14) ioctl$HCIINQUIRY(r2, 0x800448f0, &(0x7f0000007740)={r3, 0x3, 0x6, 0x3, 0x0, 0x8, 0x9}) r4 = accept4(r0, &(0x7f0000000000)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, &(0x7f0000000080)=0x80, 0x80800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bond0\x00', 0x0}) sendmmsg(r0, &(0x7f0000005c00)=[{{&(0x7f0000000400)=@sco={0x1f, {0x8, 0x9, 0x1, 0x12, 0x7, 0x8}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000480)="7c9cd1d52681a0d7b6ff2eb2c762515bf8a6802128a25902fedf260d576660879fd5df1f9eb808a615dcac4bc3db", 0x2e}], 0x1}, 0x9}, {{&(0x7f0000000500)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x1, 0x1, 0x1}}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000580)="2b95fa61c512c9", 0x7}, {&(0x7f00000005c0)="59b8b64b512832711d108b2aeafb3f09279ac527258af4b5b60634581bfc635dad2f60258560a689af58823980cd40052f81232711d311eb", 0x38}, {&(0x7f0000000600)="0c6f982e3add190f4fb41a99ebb090bd8e999eb9beebc839c4c00804cc8f273fd830a5989cf3adfa0b4a8037b05a", 0x2e}, {&(0x7f0000000640)="8e4c1ed797d05e11b48fd48ff60c216b521662243861ae9090b99c13f2b19abcdc3f17a1ee7599b67a14eb0cfa6e0d87ee80d9a0c29cd97109a92be12e2e87adec02efeda946d1e8577bd549f99e371d5ca1a2a7a47a17f457ec715466aabc891e2ab825f3ead678c0cd478edf2a8056b5c3d48ace1fb2c9fac04bc6e613ae68b40671f0ce804d74425c3cc95a1d9519fc94b0df7eab6955ca129a4e63a790daee86af120c433e68cdb4c01bf0f78da8a7ef891464a4099a0705d1042fb3a2dea1e334765a261b7ec949d7fe7b2ce16e08e9cf9b3d0b350d2d1338be3b6b85f85c24de4658d5db", 0xe7}, {&(0x7f0000000740)="349cae957409ed57eb5ea09d1e1071823bec0fa396b5d692c9578d940cff6f49218fddb97f3b7a38e1d83a0deedbb06621b4bbc4163172b89fdbcb8769cfb5624e3715df8c697b1649169696ad693951dc51762d42eb8f", 0x57}, {&(0x7f00000007c0)="02b13bd61bed3cbadeddd2f9bb782d442df6fc15185adcb8", 0x18}, {&(0x7f0000000800)="7f8cd978b5abbad417d47f45279f440baaf5d354555f813c1e6fcb4374e9", 0x1e}, {&(0x7f0000000840)="853160a560f4a152a1b1bf7a78ad76ffc4adacf111f722a676403c62d6b284f5a09c6a8ffe1c6472fbe0ee479a268365e14a408b77b35c695757834a6ef3d26ddf85007234be74e9c4e2bb83df1e0562781ce77610135a7a87b8f6502ca2bc1a2c0b6131b9c5", 0x66}, {&(0x7f00000008c0)="58a83320017e4f05985d37ff0f212cee99c851ad", 0x14}, {&(0x7f0000000900)="052c6113f866c4449a6537f1f344fbb1b139f07686eeb9916015d3d1e75ff30008ba3d11595e3500aec152fbfcead085c9a0f27cf4dbd61eea4e4effc7d26e250834d434ded05a6e713d1d6c78b605739128fe36c5fdbc8657529d97d212", 0x5e}], 0xa, &(0x7f0000000a40)=[{0xe8, 0x115, 0x8, "a57096effdb0175a4b65d0709237d83a01e8e90c7442cbf838b7325bd73ee3f6bf2be65ed123423966abfbcc93eea9005b6201b49a5638e3e07a224b8936000ecfe09742430e0a1610bc5e6c3454f156afa2909a7033764e2b1d369fe66375ef4a8731b310cf91e6886faa10a9a2968d87b969e90cb6f65e879dd7c482506ec1bbb9aedceadfdc221a16c0afa70bdbb0db6dd5b4aa697b3d77eee0afb5b9483ae1674e8e40c5b70201cc496c6a67a495229d95e5b04a9ca26d82da37144efec8cefbead8557b1c8f6b6213e7808d6681e22da9a8e7"}, {0x50, 0x1, 0x3f, "dc5b7cf39274d2fde0cbf1ac2a2d0f0e6bdb055a7f8bcad1fd2ccf78e27a50524e3f9927b28ad30466b817c6a1a596da06172835cac938812901c71e"}], 0x138}, 0x4}, {{&(0x7f0000000b80)=@rc={0x1f, {0x7fffffff, 0xfff, 0xe8, 0x7, 0x50c, 0x7}, 0x2}, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000000c00)="3d6f1f8e", 0x4}, {&(0x7f0000000c40)="f8efc9de2de43ca493d499fd00a476", 0xf}, {&(0x7f0000000c80)="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", 0x1000}, {&(0x7f0000001c80)="40c0814d9135697d128de968fcba02b42bcc3c721d0f646420f70c48b263494eb89b4b6b1d5be61ea4d4c0196d5a3c9b69e0004942e0fc9d10ed60a2cc3c434f780d25a0208197ecfa", 0x49}, {&(0x7f0000001d00)="f9e5297d8d26fcd50bb33fe6dfe875622137f4e38fae19631022cae7836f590c32752e3e4b45c9a1da8fcb6b1d9e58764a2bfd7ceff5ab14e2", 0x39}, {&(0x7f0000001d40)="2f39d4c0e5fc46276b77c0b73725dd506c39c9c09b519413e930600e9d3e5c32d36d402861f250d00810c59edfb994ff8457c3b5f3424bcc3c0fbd04c70a4e84e2cde9a2ae0bf1ad8b279a647c4b1a1c883021115c7db30883ece6a75fcc155549228ad4b1ed1d501b0e538a33490293e7940763ff24dd0b9b2ce4c03a", 0x7d}], 0x6, &(0x7f0000001e40)=[{0x28, 0x117, 0x6, "a7577e1b3104af29809dde1d9707e9ec0cb2ec742eed"}, {0x1010, 0xff, 0x75c, "a1d3f6aa5679ef4e05d78d7c104ac9bd29d6055f7d085f6e6e875fa50093487491f885e7560d7c8ea2db5e5ab1718708cb02d304e124bfec767a1809c74c70c20b49bc3515eb8f3ba392a740cf5e754d8afc8d6f07d3df78d5b1bd14947b3c30d924d5ff041c03fd3550f9e68ebecb095c5b8c22cfed9a2cfead553a374b790e9eaef7d2b5021518e3127ba9116910cb2273fe3bdb33fa47cdf7eed6a790b4705d61c83bd408d8676d043ed81b8e6572e5b4bf709d5f8eaf1b442734e2c9545e43f23b1ed72eb8bd39c72fe0a52760b250fc58c4950c0053bffd3fb397d303bd083799d61ea8ce922fbfa6c84f073c7fc3fe3e829112c30d6b3bc7b8547492551da781ca8bb877d8b39947004391719c2869e0ccc61d47016237a63ca6194c94b83ccff96d4816a9ae2f09ad3636fdc5861fe1eee4110f31ba6e18d078c0d6ec29c30f1cb7446e0ea412c5842722328f66df09d6a370282aa48392f083b05a135e775d303c44162ef1e2d65d341513282a2a890ff9ea45818b5b4ccef242feb2e845d1ef4307e27dbcacc6b94a591661920e0704042b30546329dc1c83a1357be9c0cc748606317736c2a202b81f3c329f96368921d04e00d3e4c4f60f416bb5de1e7e7f0ceff4a1994ba536d121268731b132637fc97e89c54a8dcdbf5fbb5f37a8bf0db8d757cd90cfbb437ba12288a0d5213b84299a7c1d57590a459a215807f3204fde0fc5cc9158226f18208ae89f3f31557b79d6c7f3c2ecd2348c940483bc7043cbebfb529c8e1c667619f5dbddeacc782a30721e179bba5fc3de8d7ce1b724911764aeed4e517601bd8473c26057b11532d0d2972a91e4e8c316d9d3625c8a5f4f92be2d0131ffa33b4c6e83e964d7da389cb285b65088d7f07d89a521af12df1c7679e85ceab6fd407a4acab4bc49b21403f359f7d4b68d05bb1b21ab4f431def9366d3e60a6aac7bf9efc0787730d448667f0628f3d6367ef54f155675963ba525ce8350cccb53b5da4ac8106b404e6da61cf24eee86dc814b2fc4352983e86595e2629b41f39f37cf2aded335e49a41b31f24c47ea563d430127fe96811f5445d9007805c2f7599aa0d060dc664bdaf6cbfe111b98c05386c7fcddbda5e098433360f8f23a392fa943fe501dc81064fcc3fbb50db42b33a7ad6fd1376c1ea21f9c3a2ddbd640a67ff5d507a203ab5a3da721a29160aca7550da906ae1213dcda9a886307292277a35b2013c4229507d96942165a86da5bd87e126c0b95d44224f4561b4bffebe0dee4310c4039df6f02ca7335775ba2ebe1666738ec4d800f78211976bbc59ddaf374a8201b525e68d17bd0b5679fbee5dd50c4d37d5a76c195e9471e9ff510b4c911d7940df848f25eba659df9c9bbd95b38c330de15a84554f24d89f14a7d13597adc2d23d2d871395e9458c785e77406d4b149e9faa6aa1732a55e666815e831162b2161ff133c6925d63ec45523eb6055feb258b4570ada40e582cb6ef5e265ef3b17e0d3dddd302bdfc5a1df162f1b5f4778dc0ea3adea69acf8a0c1fbe555c0276d335b24614bc75e1f937c7a9a5885864449a6f19c569a704724b8522ebff3979cf9b379db6a3719c491d45c7b40f3a36bead86f53c79e930af810ee4beb263bf118c318875956d5dfc6e1fc19d9a6a24c8e894b55b9f19f685cd7678b331d9c6cb3fd90bd0ca193c294fa51cf3890aaddf8b1574794b45bf3d561c363bcb59f6b20eafe008cce34bc171d64288d5363f2952bfa1059ed30343969adc37e07e41f056946f8748a91bac55a1ac8c51b95811165a1d1a7a69d050f624d9712f2dc38ccf74f2d021795349bd9cff53d226b827ac5a97589416ae30b798071901cd705766d9b316c9965c47b39271a9562329db02f6a272b565583d4ebc29321c94c7ac715b2bedfdcb5e4e306ff4ee68dcebdfe42bf6a3a5c3f53d28ad6153b28f652ba8581f86844ab8bdfe51be8f6acd14532ea5bbd1edb301bfecaf3f5bf3f43b1240b3d6c27b34390cf235485e95af7735d276538138374b1a607886c1fbeae444029e378fceb9430c8f98ecc98ec143a8ed7da6b578504aafbc771f51a68a47f009dc920b0e6caa67abfbd9be1cf119af0f53d2304e2d980bbf30e430cce6fa42c748afcdadd12a78fec458f29e530c05c8578bf199e014d8063251e4d7d4ba0e36fde735d886c0494ce581ae7d7d6598333b8d51659263539ac9e990714c6697ac3c7f82feeef64acc742ebba635da52b2ea2f023aa13670ef84c8095718f56609890a385cfbf1d19bc5fd967e30326757dcfd9e1753b2c5cf8ff205501af20bd118f1880108b03b90676466b39db4f1701806c394dd776eac5c771d821c4c22910b78be8ee90d1eb14fa0f54f6a82fbfc7a917d5c4bbf452cb18ba5610c82ace7188a0ff6193083e20a1d0f1a602e7fb41c63a037d22b8f92b184ec030891dfe08a344a26159a67f5832b2f8bdd49f477fe190bf53f1c2c758fba8c22dc02a5e198c9689eab2a062b81ce7e9af0aee3d67ca34fe7a357f8ef77788acc651f4cdfd327550bd50a647d2226daee85b44623ab77337a97c3166683204c07742f744814445935b154d42add52bec7b076b8564d421e5601328ce5a8ac0e3ae82531e7217278ac564e8b129c111ac2b02a0cc026a484a12c4ce8f574362dc341bc02db4aad1e186b9c7062cee3c52c09429e656970859faf3967d49880663424f51acb232ed05af0242a011e06cd40acf74e19347e2e23e7265bdada82bc891717f45628678e48bb99f0b5209ff4814cec67d7ddbb2fd3ec575930435dcf9e7f8bd6d8d4a2e7ebef8f2ae05041efba175cbf859b5c21fe27d4861634de1f23c6ef89a84dc195402f4b0f61beee503b9911d51c3419019fe9c58b7fb143c9697f35b1810e0c72082ab0e690db40074b100d0cca8688a0a65584c6db9d73cd653676bd23b5b785a024fe6f1240413d3e21233fc71b459386cdbc14050e0d1ea5c2f23d01061aeff0807931513d9a4a6147eeee8872120b58c02e54be6380e9ee7dbe6009a85b7c0a617698cd7722b4ab29daf03e689b13b17bbe37394b5e551293a0eedae5ec6f7495fa05dc0254279b0e77a705fa266972906113afc9275ee6351200d7236cdb2a14b8c121d87000edbc7e6fd053c77fe1fa80687fa826f00e7357be7fc966bd388327e7c194aa116d5370fcefde9736c4625e3c86576dc30b063aedcbfd5aeb0b0b4685d5b72a2e89a6c2ec0439ca1de0ff7578c0ed644f5dbe46f9eda7440f1bd06ca8959cc05d2997feeacde5af434434b9429814c84310ddf0ed97fed0afb640bd794a07ccffaaae2bedbc3cc1acc4bd5074fecdcc641941c705d79183e33eb0d4e796d38ca80f53a5c9b9a5560193477969a8cac867af8193cdc2b0c81de06325ac77e43e6f6ea2c3e10c80dcd614ce77dc1cedc42a29da9d220582c2d1c40550e9148c0a2606884cf73b1c034270a621dfad88108e0fc1405ec87772d3bfc11c73b0c1e3e90e1042d3277ca80e0776fdae3658053441aabe5ab97e72e0eb7e6be337636e52f95112bd27f04e056c72eafb8042fade36626e3b201daef226e98d5f5a8d25ad6f02545421492c7dd2316621605873b445a19a18156cc812d87af02a9960e1e59c49261ed7a9d717fc722a9cecf36c5fddb56ed7be6fcc9a33d45e9a93d903825b6c9d7589f420ced78bc7d4ae2926f0c69938d33a7dd102db10ccb233ed1d08fe2a16e33af09223cc043b5399d99df527450427d7c6175e2c432e0944e9d11378bd8e5e534b516f73652a004aebb2a3a5e560e797c3057cfa123d8a1c5e2a024c4c1a653d4a15489f801a56f721abafe8f9c54dfe560cf3c3ead8721d48d372d5fdafc9d1da82cb93ed16dad730aad267cc704b7b83f9b36f7e0fca25590db05d1c9afcc25591235baab5a42e95b880e69a3feca2135fc39a6678c7fdd46996edad0973364786208388fc3c2881eb0be382032c778e2556928bf388f9d0586170c4106b6cdcebaa0d59e26fd3bf51f059f407a6e73d66109b235aeb319604d9b24eb15eb556a591fd9110e5f2009d0e88965a6873e3df2bda1d109d8bd857b09688863c0d049bb20250888da0973c7ac64424048a7e00aef439acd0f05a37c78d262fd10c870a5c93e686c61e0d2de1f169ab255c24fa07b030df740817ea5c52d0d21c235970ca394b863c57e9c243441352f2f6c12d54f87368b02a84c9ba028ec27ff254579f3b3c53813ce5b083f369ca71799af8632eb89a8dbf169f19742aae7dcc57590d82e75a2bb8e984368bfb3e9f7f84265529ac93ca3138bcbf0832927b09a656d06abc45254f0d6378572d0bd2eaa81a45e19ffcacfe0c6bf91b25552ba9209c2dcc8f392ae0fe059a0b2f1ecaeadebcd629783c19d341124a416bb12f963643d382851fdb2d2b743a3c2189d27b6448cc7a8af16a7317ae0d11ddea7cb29f61b15d413f70f5ff8d9d5231a19ca8d517742cf27b21ed827dd9c4ed63fbae6196fc211ed698c35cb9147cfcfded40d9223d30f28019a0218f894e8edf341a7cf3d29277048e9d2e07b0f68aa40c9af45b4cda06fdba2974f1c06e5bf68ce388e4fa5834c6018ac77af1ff07b59a450ab383e26946986a0df9294081c71ebccb096bc958b9e47871b945ffd5124541d1d4541fbf727789e2ecd083a6607cea95cdc6d644028bebdce8a4b8ce7f90d2159a19bb422e636e237f397607f6ddad6d73ae33f77ad4dda9ded2c68c71d1aea2d30cabdc595f83edaf63b6a52ce11f7b021881de1d6baf8cc1f8e581585342f6f9de39fa4c1daf97c161e74694c0190285cc5577c61aec5e239290150a620ad7f6f33d50c938414d60fe62639d0d79948025cd0f624ee13f72d6cdcc934a39147131207b0a072fc8366c622e5ab344e66b1fcf40d872193e301820a8f75218f9a7cdf0a3159067f5de9e397cc7b11135a75d9d62939d5166efb805925f810be337d8340505b75bc28e07182fd8c2224f664769683064a598efea92eba72442b7d3ba9ca8ccc2fc63cd0b16d1f2359eb19c0d9fa6fcc9604b2630e3d598563d18e9c6393ef52c0fb596eb327b4e72e529b5d5560fc36a481ea673a240797077a5d1a166ce853aea7dc253fd74093d2907af56f40507114807233b5ef445ac6646d12bc414a94fa46c4bca2b77fc61fa99c6649a7f209c2b130f198ef3187e683448676c5124c52657583eb7e540b382a604c382767aa93746e76b2d802d87ec366ba99e0a293590f48ab4427efb2a817de8f4b740563833a303728dec00d6188db2e6a9c0ab4b8ac84b42f50a24a9f279ab040e2f140a8ff49231d0da18708729a9d34f1884811fce40b4a5688e0de2a2e058f70a9ec91315d60b04151c199c448d9639ea81d08635223d797120c1a0368a6532a1376af00414c496bade8c2afafd76139c60263e510c958bda627bdf211342fa00407ff489a796f2e815947c99ad973e9ca72e784148e7f46a5f363b81119afa20b3fdaba4c2c1280fba4b0ffe5bcf15667d91f434d7a7e1be713041330ca76fc79f942b8c100398aa08ce7794b281a6c9e28ebfab4c852185d0c5ecdce27b5fe625026e042a1ecb29b7ee5556b3af9fdcd5fe97e7aa9e115a624d02ee4eec88bb75d9c151ed6f359ad23e207b5b22ee045e06cff505ebb822ac1ad89d59075e70da98a9ad5adb58006c2e81e86de855d8685658f0f2f5946de89205074e77e2b26766c092a50d8139b3c72254d301d30112cd914a82393a5fc9"}, {0x10, 0x88, 0x2}, {0x18, 0x12f, 0x5, 'z\tG1'}, {0xb0, 0x12f, 0x8, "d9a73ab28d2e091228eb5b6d5f16fa4748ffb79b418291bfc5caaa37e4e3e017006e004dc7682cdad39b8fa2ee0e3bae43c6e2af6179b0d9931a4559fcab0bfa76122fdddd1b65bb7c7914ae482bfa46e664f3af4ac277427fe71deef82c6a09906a332bad661eefc69af5486bbd7d494ae420107f31572793d566e0f604aca7b5a7ee1e06bb2208935706c993d31a1301310a19450d1c18e632fc"}], 0x1110}, 0x62494f4e}, {{&(0x7f0000002f80)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x1, 0x3, 0x4, 0x0, {0xa, 0x4e22, 0x1000, @loopback}}}, 0x80, &(0x7f0000003080)=[{&(0x7f0000003000)="0a488b422a3a457194bc0f253a35e2eeb2ee0c1d835ce8635af9434d0a1ab6b2654d13a91e51c192f200732859cef3196ba5a8b45e285a81cde2af7ab6f83d0f406ef151e6", 0x45}], 0x1}, 0x3f}, {{&(0x7f00000030c0)=@nl=@unspec, 0x80, &(0x7f0000003840)=[{&(0x7f0000003140)="3f8682e9a6a54cf35d2fd878746d4f7a30d3b3753d469471a76f54fa221f97d6386d2fe9b0f195def5f3d05b6ef54726e4e738f258692a947b9a87a6c4a8a53898ac6cf54e135925d130c97c577869fde2ccb442f280374e2076de52d3c20d3238e253dd6203c6048848fda07b8adaa0c636a65511b5c3ef0074618a6885bf849d60", 0x82}, {&(0x7f0000003200)="3019af968df1309c64ac7f85a3051a21b73b7987084689364bcc34ce198647de6e7ad80ef7c2165d3aa8f6e5a94a47b97b825ebb84b0a02d378fa031093b76807531d2550e8047b94c7cf81b0695be365143ba399c9f204da2eb1174aab184e794e110ebd3", 0x65}, {&(0x7f0000003280)="885a1cc4e8ec26da64e82e7e1b92e34142f364b45a153351c8f59e43e24fdece512c5f1e4e3ed02c8c16112d1778dcf27eb4801890a356c37ea400616941ac95fcc6d289c69c38fcd9dcf04c540acaa2b6f5fec2266acab11e34d5cc5f7d68bec517a6865f1498d021afe8c8bf3f042a9b3e4cac4346641c869a7ca71c21ea4d49d53d1015feb899df7cdab3d074f7e661efce5011f81d98909ce0ddf9a0cb93f9eff3af4bc754552cca0ef8014a6f79e748cd8f04d45d42b48ca2597d0cf230ebf2ba52d4d5a94f71c681a1a2cbdd2a5e6bb3102bb66660a0ad7f2b936b8f97ce46", 0xe2}, {&(0x7f0000003380)="e94a0a5f47d2e7a32f850d13cfb2f90c0882d0f8eaf6a90f224b10ac736db111ea0ea45d56d5e4b344ad55649441141f33330e66e14c63c326da6e836d2daa26efd24377032b8131943deb", 0x4b}, {&(0x7f0000003400)="4782a93714799730c7df7dc5ef9c9c0641aa82a4caebd873f47ad5e6554a5aef2c0a937fe8778fd52e5c9478bcf49dbeca733ef9608600171c48d0f782c048572d0849ba3e1c150c18a037b47279156f205fb983abb0f741ebfb17440ae5200dab3fffaeaa2ebe71ce832ce2ec2d87d3b688035187c324177a64a065743932889f1c401568ae529b3f", 0x89}, {&(0x7f00000034c0)="e7e3e42a994447c7dd7903ad1838cfe0b53e1e2b9da6b238ac15764ec99f42466705ff32e9b681c71b2390aef38c1ed4155653e49060b14e7a240edd60d9d4cce9b9925455fe262a3a0c7171ffef985897dce042873858c97c1f3664cda7caa1e7fd5b7aeb5e67ecaf91c49cd113645312fe249f36e59c6f487549583a01794e8a68e4f08fdd40df895833d0cc6700ca68daae11b1f32f6939abfbc447f0e3b76eaf", 0xa2}, {&(0x7f0000003580)="19316ee3d1a50ef0c040d6bbaf595218dfa690c2562543fa6c279f48af2066a56bd97547542d4224917d2a3226fa2dffc3b67d0250b159ab2ca8ad40d1b7aad44778fb87861e0bc6d84ecf99e12c49fa2153b46fbb99f177f8cd5e2a8cdfb8e8b4b4113617971a5b7fc6a93d2630906edfa8634d77f5aaca3a231d2a8a7c2e419b5f4b1729f0291e3d9629a756d44f43e2d41958b8036da89458b2ce0549023058b5067a453307dfaa484db3328722592a5b68dfc7aecbef0ce2c9448a9733175de1a83a42a1d8079884f40053b16ba5a1c4c78d5c11f0", 0xd7}, {&(0x7f0000003680)="fb22592e4eea1f2fa7cf8f4731fb698686615a1addfc986011d7744fdde0efb31076dc485f229b01d4c68f80e0788b9e381c03f17a3e0a4d40d4c41e09d2179baf5928dc037808b2e907c582a6758faa128b1c3868e94ea3eeeede84f522a1576cc6cf2d3cd881678068dbc3a5d48013fdf79ac0e4b467c66073175b4d675a510bc4369ff7bc391bb43b70d3b53948ef501f73e30cc1316ff22e4b24b0ba9233382352", 0xa3}, {&(0x7f0000003740)="2763541345b9e1a6e17e2e024b98276e414a097ad59bbead4b2083572f2a8ad846335bdd7dcf7ed248f9cceb008de91e716d1db5cce173c85d4c3031975c2066a0f138e2e274c704beec970863b534dac9958dbdb0906a7749deecfaff859b212669e0ea1d0b047c4e12b852753ebeaf9c6ea9ccde6da70acf367040f4af70db22c29a1d48e54ecc79474aec571ed0977b647df3fcf44e87432d8536777ddcd8a5f7fcd29961ef1c376aadad7ec813e81578fa5e511dbca8eede347a6f0dc7462a2e2c4622af515d226bc04774e0de3007eba02b64a00a96b73881ac5db998fee6d5a93118264c0da8310cba1d89b8d6", 0xf0}], 0x9, &(0x7f0000003900)=[{0x88, 0x6, 0x800, "9aa7b7475b8d484137bc665e1d809514a6a466a4c49e650d4e8fbfffb9f56c6fe63dd29099e06197fc1ab964837925ac2bfba317766e47769fa72458cab8759ed382a4354de73cf28e078a566128cb000e043fb0d78c3e0127dc17218491f7d03915adb6addaafa80d738642ce4fc97df640c198ee8ab4"}, {0x100, 0x11f, 0x7, "ffe54c52531deaa2c716089a368ba161cb13d45aae438cd4838b352d79239fc094d5fbe60c382dd9e8e2227e9d6c8559e389912dc0328d07dbcdb23317bd4789a68319262e74408f954c0960a63b06a095ff8f401032e29c90d3027a31dcb230ac45189634ef54859ed8f8a34b26aa6d5021f864a8578a35972001c1884cd1a28c07295ecc73725437a8c3d81a899695cb51afe998a483358c5a58177c260d42676a72e5214c8659c09eaad33546b0e9ece648bce807def0047a365ec7e03613eb2ca78f65efc7973cd67aa60ec6b0ef5afea2cf26c62adcecb218f2646317846ab833208056de62b9acff381a4390"}, {0xc8, 0x113, 0x4, "6d582710b1521d3e686c5dfc91a1ece14b8596e0848259b6d072adaa9f834f82ffe87ca98b6f6e83d692189347464bef8ab865ffc306e15051ff4c45c4f8322c5f830449e77d57a265e706e03f788502459a7c4fa2c18925f64e8ee95c9fb5343e05272c2340584f86e3cc08885b1e3aba606b7edfafd0af24facd5cc3ba26cb027ab19d9b48f843ce403e2fcf560508fdab08163983ab23c049af173c01eee261ffeeed0747cfb8441dafd25558ebf7166b8a6002"}, {0x70, 0x1, 0x120b, "9c90a9df78c90f38f3f1edf4c2fc79bd519928a4ea97c7b94e08769def0771c64e154ec50d0c7da33fd98c8d25475d81c7bf97cb07dc23cfc682af3f569857251be676ecd32963b303831582f54e2f9205530b546994acafe2"}, {0x1010, 0x11b, 0x7f, "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"}, {0x18, 0x113, 0x9810, "f6"}, {0x1010, 0x11b, 0x0, "ec64875eec3bea4f7d7b3a631718b2f063aa6bd45e9b22f216e1cf0b291b533f53c4c6fad5a12d246b98286db2cee733c5d0f3d3deec98696491bd7067d2bb17c461d911e11e1319ff3dd53152ffcf4b488f6f9e8d3fc81af86f4d3a56636ceff926eeb0a6bc1ef4eb82856b39836df763595746849cc3504619b13c146736ebb73b5ddcdb05c0b828b1c2ec2f897b07c1b87878dc6421f455997e1e504702fe3803007dd30c6dd956760b41ac6a760b7b952a87f90689c57ba8c812a7b4bb501480bfa18c4553c277fd5b8964c756712bb1211fccf41d1ff4c72e565b9f7f06de5be93396045611a62f380cf630f75626b1b1926349ff5e231d63897240ddf9eaeafb2e4515c1b852bdc108e52ab68a463b66370191ef356162c08d95a9a0664154b9036d0816776ada5f394f949984f5df61e560c00816fb8f67bf1b32785c3810eddbc0c032fe49d60ae20419aa77e1d1ccc880329b3b9d4cfe56de8df018007b009baa0fd3bcd4aebc006866530d83651a0f312953f85520ca567cd222f8711cbc3d3f03616b060831ff9b00036bbcebf2fc05e31a11038405bcffdeb91952513555d2e3a1b4685e2944d45ac963c4a7dc18cb9d2a7e5a21eaefeb96ecd393a5c7c1eb7ca1de2eeb31981b5cc8c3e94a4edf87eda5dc07af47ca03098cbbeae40ff2503dbf2edf5ffc6f4bc4ee958dfb6f08ce30058713b81e0a9b404f47cab29fadce6cda33cab2c13579b9e999947ec45a8aeeeac0ebd4167842d6070ae882071f0e0e9d7c9d6b755fcb4dd7ae8449a748473df9967a64b2ffd460b9bc0b1b7eaeb37cd9b9ad32d85dbc920743a72312e3a501fcedd11ddd7bccb79d97dc6830b9046a8119b7d7b0156e917e53c26c4f5f36cc01e99ea3bae51cbba5a7d2495fefb05f4ebe917e8d7c246305e7c965ef9a29d76dc5fcc37898d25717c7cc96fdd41b19fc194ed8b557bcce2a01a9c2efc3959afd9a24b5987fa84049c28ab25883d4e9921501e08c2472598e4f2cebeb4b5eaecce7f8e02745ff51487fff462629e447a6cd8dc99b77547e114d73625deb57723215c75d7d4cb74dc327998d7943143b0a5bfd1efacb74124bcadcf43a98b3573255db93c468e93409fd1a541f51a0deb061bd465d7b40994833bb0aa2d4132c2e9244ccc2d1fe4a54b5096d7d3e4c9e4ea0c6b371a830cbb6df6dbcade1f7b2dafdd711bb4a9d998bf22ea25257f867ba4eab9326c3a58341e4d243a0314bf3a0e37b776546bf0ff7bfa87b70bd674d446bc4fddd097ab63f9b87342ebfb0b8764a4df93ea9ae9dbf3df8b641b05b5bd6b69b07a57db27dcff999995e7d06b75599664c2f94e5ace72b7ca95e9ad26857d149e0b601e5fc4ecc27a5c289ad27e2e835cb3709f69551ff6be9292a4fbf19d3f029e0c34602bc046af1432c0dff58a95293869a560d98649fa9b82fcef8279a73f0a252a780b187cf75a544e13fba647ce80de56161e6df70a4b62514553661400d2bdfc5b1f8f3486833a73f45bbb71105116184cc543218cafcf311d25a0df1403b0e95ede0e1b179754b6f52266258e4bd0de87f1381910c697c4ed2e5a4af9846340486322070f3fddd45e327a522c10c6899ad8d2a67d962ae40e8703e4ff1d7309396bd7c0950c4b8fa61e3bed076fdb16933724ab605e2e13b8a72237c2556fa3bb6e067600b9ae7b25849a7d4798272345014ab61c95363e888d00c7116629e2563ffa998cc099467d452f57503c5d3bc8ba32016869572e9fce67466c3485b6cfb7c1b655b835201bd85169668c2b21a5eca899a68c55f450918a78208ea4269800f41268f6c4dc9cb924b4f0c704a92f1423c3927f97a2e7355bb45090d803eefb112cb5bef15d4e13c2f4167532b300d31f7396f9218efe5134981ac7c65df961ac79575b6536543e7226b6f8df25b5915796e2abc8a8779ad248053b0321f344af075cca41dd48027c138730030690e844c7490459dbbf645e4eb803c4c02e1e0493409ae75db6e7ab40a11c2d67be74bc7e9878e11574901a971421f2e7d2012df0764e6da94158749343870f493c7a80f0ab262934e6ca7f43afa3d28f57634e6ef02fb9e57886b4b84d65c21ad1d23a825088a71e1ab4016f3530d4089fc262a544446452b5f46336ea56cf7f92c3975d1a70cdfaed873211d3be67530e9576322f9e5cc169aa37ff3b29dd0ee50ab8ceb84293fb6219ddc2b060d5546e1be6ae1fcb1a6a2105b8a877c12041590ef1dfcf4863fd5edb42c59212b9a2eed119be97d9b9f17488f66dc0847d37377faba714da4844c8cdd5b130dc135730de0e4ef146e9dca41de2a0d8e3811930513ba942cf1b9730be167cf6453c6e16101ccb5a83784e276ae56e9fde1c1185614f81430fcbf47367c6cf5461f58c45bc8fc405fd2fd637eab5a8e2f4f08ae90a1a4ec71e034ac7aba36e27b6c757ac6e819020790a8767511cab64663d6d583a09cc051b13b86c8c7bb3d5b06f0b76b992df8eac185d2c56a108df1047773fc47dd2f362682d09d83c259c49fa8add99499806c8ebe37f77f489aa0ad1bc54495b92c755dce55e7a614955650c233eefa4359f4199113081613e0f1d9c9e0ea01d4f1766e9aa28985c24ed0d87f0092ab55787f4788fc5a044a951bd445f8f876ac03afdce1a830ef126ec74ab05382b92049de9b6e50dfd82d6784585426b649190be88f9c111ffd23331b0e77014418df168441c69baf3a22cf238f84d312583b3b47c0266af6bf30026662c157331ea96dca8462032f58e7db83397bb1d9d43727fdea597610a32cad3e626f3cf9801771918fb5b5d33bf2aae3abd583ff135da947a44b9fbc5afd4af29265b8b6cdd4a56fc68caa017dd2ccff3181d7033282b486fb19cfd46fdc53ac1f819886dc4e411510ba9857e7b7facab8336f55e89e4ce3ffdd2adeecba42d7c8a391fa2b84bb2814b456c1332bebf277fee05797204ce365fb3c531f0a66ed3163c60714551937bc9afae8bdf367bbc7d1ac39077dfc855ff560707b22867c91042e505b99a6e97bf37c4cafe3c40b973900fe0fa4a5731d528fedbb033475d99f35e4202b15bc8e32ad6caa849f461f2307f06114d39cc416b34fdc9444fabdbd71e5ae41b8d7e6d86efa5c9c384a39d53951ed8ff7124fd1efe18a6cf49db9ad8991bdc34c959ab49b553bb0bae650f57550b31543624b02c0963b0b57fea98c3785cbc805e1cc87c24d1244fa2cb4abbbcdaee105a22e0ec2276d7318ec58f5dd9f0072e287845f977a2efe0ba3b5cd123a2bc8c0224abd34528ec932673f33fa576eeba5dd8b76533ca8a200a5ae9e263296ecd56c639a7c1d7c7086f1e22f6979848f0a0e6938c1a764acfb6b65a55f0de4438c3fba8c387dab16b8076375ab40d387e98b4496eddfb916c234975648c409880f03b7d1da2261453915cecb28fb426898be04315ba6019bf50e3eba8936b811a1845730bb322ff85578c620b5b246da941a24c171b89a72b01840b6b5e891b2f095b88f085e0ccb6383fa8d58f272376d93809fb0c70ff2f04df1df63d2abc8abdb31abd498786fccc95d523a8d2fca998428e6b2fbb90b2ee6827c9f8fc0070fc608377d827d15ab5ded0bdfda761cac8905313d1b0e48f652680acfb1d6276fcde1fb703aa7dc3d6e12f1c692519c5a50d7ff90704539acdd3dc3320db418324a282a32ad3af395930a6754f3073c5b9cf80e9bf9ef4970b873b9339bfc38160627380c3083b8591becfe2c3b5c25599dfa52e42035a5e1703ad2cb94de206ae8686f75d999fbee8ad729507448c5b023b70e920d4d4c37b013ae22bf1b8f4cfeb941857ab06889277104c19d8cd2495d1f5119782697b31c497259bd2f4260f3108431ecda21ee411d6f061182389b6c8834dbb741d1d7fbbdfb8c679617aa8be6108d6ccb4367caec26c383fec1853a0edf187e1d18b5ecec64429ca203665d9bdc368e8ffe06eca4f4614dd179dff69e7731da1fb65fe532265ccc696e2efb5af512c88703e5affff29c8c7522bd0a827c50abeb62c38e6387427aa795ffa5529796cc7c9c38556a7448fed5bafaffd1eb7845f23420493fc63403d50cdf8aaabb36086c0836c8ae5059330edebf9b65beb33b2f8f5b0ee9ff3857041c47a45a2fa473e9680d21a4352a397f84fdf65fbbab1e7b9aa19d29fe5be7611d3214be342c0e7ed43e1ae07c27a64f259db5367be8e926acd3efcdd012a5e1191103ea57cec48fde9e1792f5b22d4419cea48afd64ea039d55869766331099913b533d63573dfc7ae6a5c6e5f6ced02fd5aebc41b68e08c151a684755d7c959f46dc6bca11477672907b0ca2178976361e8b1e0c95d0013f1747a359ddf300c20f9785a7d53ea6823959728b18ce03d702af9b0bbd21ba7850d78f62c5475521feeeb65614c91ab72b20e09e157245411a288c05934fd8ab83bad20a040906e58002364f6ef65a9d910d541ea0ab208295e5bce8d64551635b9fd37d02305b7eaca096d5f95a186dfd6d00af918af35e6d1fa3eb9feaad96464ae4d642df52b2cf26219169e511112eac047df26224bcba2b235a2e1c58ee8cb2d4141824df652cc4ee43ac6ca180c7c0eef90b6ecb3bb60b55cf77036a714fd9ea5d89914dae023613ffd7fee6f1272dafe8da7bd649b5f361d071a58a342bf954e8a5115e1d2d8ff041bb67f692e8c2ab4612ea4edefd652d844338de2a8fdaee665f47cbd7292e1050f86ff1ef8034b6a96a5f2b9c2e97cc615e16107d7df755fef3afe6ae62e8bf2878886522433dfe53e6c309da5b0dcdced432e1d0a31885233ab775ac9eb505c294224ddf9727af3358d582e5db1e79682a8dacba82c434b1eb0a1a4e7df0daceb05e4837135b916f09775318892e1de680e5bcdbfb61f5432a3920f303c0b739b81c87e5ecb0be2dd518994cb2a01199d65b1a325a6d723981c76e044664e659629a248eb63b032e4827039f009183a17edbfbfd8eb0bf27510f8b13df113bfa42616b7792f30e159709164aa461f1bf1d5399878f512b0ad03b99085e73278edfef7ac94f0c767c8ff437fbd3640ad82be214ca82b693bdebf40360e2e8bdfc49d2167d4221d0a193a460997bb42c753bfc0d4675189be9ba04f066ef6cfb249e5b91f72343dc4bcdc4debb5c1f2976b6804ab6c8c8b25bd07b624fb7c6d7df164ba4724cb0bb9cacb1ed9337bdc19a92956265263b808c275897917d61c54fa7d00fe613f5504d80efe21cfe18fc97f06bd7990ea3be56b65f9952073f8431b09b9ce7fbdbff0ab56f7b3a1b90c54a8991c70a9fbebbc236dbfd194fe8f07f9031f9ac40af8c13e4a14904e9024dbc9eb4fe802e89b8055ea3a5af4097677dfb9648f96b8f6051b2456ef83283fddbe5eff8b1c276ca50f4e9bbe570c6f25ba42f64c83394ce1d6df4f8533381cd56aa37dd077b23208ea06f5a63c0c1a7b645cd62db8a70b09e2bb72fba6c38b735ffb34366562c7e5933e15362d08eb3037321ee347425007565904ea65a513c6cca2990bcf0782c815c2be10c4b4d61e5dead123379740ec5461f5a60b5e54b1a17f576344d3a161ae4788817c1480dba0a8385e399dce4ebeb52f4c62949c22465b74d8ddd68f343fc669d4505be417420568e1ad70cf6a419c03af45fd50e5863916b400080ff3ac22b1b19ef2052596dd7705f324ff21398b9c0d938c8511a0c3deb7b707460771efef0c7f5c3d1fd1ae7ec12dbbff9c27db1bc2fdd5d7ee762b871445a60d28b8bd23872"}], 0x22f8}, 0x8}], 0x5, 0x40000) setsockopt$packet_drop_memb(r4, 0x107, 0x2, &(0x7f0000000240)={r5, 0x1, 0x6, @random="5a38dbb4e905"}, 0x10) lseek(r0, 0x0, 0x3) r6 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x40400, 0x86) ioctl$RTC_RD_TIME(r6, 0x80247009, &(0x7f00000002c0)) accept(r0, &(0x7f0000000300)=@in6={0xa, 0x0, 0x0, @local}, &(0x7f0000000380)=0x80) ioctl$TIOCCBRK(r6, 0x5428) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f00000003c0)='lo\x00', 0x10) ioctl$sock_x25_SIOCADDRT(r4, 0x890b, &(0x7f00000000c0)={@null=' \x00', 0xf, 'ip6gretap0\x00'}) [ 1662.244632][ T6092] ubi: mtd0 is already attached to ubi0 22:08:04 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x2100, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$audion(0x0, 0x0, 0x202001) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x10000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCSTI(r0, 0x40186f40, 0x712000) 22:08:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0xff0f, 0x0) 22:08:04 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x3, 0x200) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f00000000c0)={{0x4, 0xffffffff}, {0x2c, 0x100000000}, 0x7, 0x4, 0x8}) pipe(&(0x7f0000000140)={0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) splice(r1, 0x0, r2, &(0x7f00000002c0), 0x3fffffffffff, 0x0) [ 1662.393930][ T6112] ubi: mtd0 is already attached to ubi0 22:08:05 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x22d, 0x0) 22:08:05 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000001080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000000)=0x9) 22:08:05 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x2100, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$audion(0x0, 0x0, 0x202001) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x10000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCSTI(r0, 0x40186f40, 0x712000) [ 1662.941099][ T6232] ubi: mtd0 is already attached to ubi0 22:08:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x7ffff000}], 0x1}, 0x0) 22:08:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x40000, 0x0) 22:08:05 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}, 0x0, 0x5}, 0x0, 0x3, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000e69000/0x4000)=nil, 0x4000, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) 22:08:05 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ppoll(&(0x7f0000000080)=[{r1, 0xd000}], 0x1, &(0x7f0000000180)={r2, r3+30000000}, &(0x7f0000000300)={0x2}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = dup(r0) ioctl$VHOST_RESET_OWNER(r4, 0xaf02, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x0, 0x130}, 0x20) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) io_setup(0x4, &(0x7f0000000340)=0x0) io_getevents(r5, 0x2f, 0x2, &(0x7f0000000380)=[{}, {}], 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r4, 0x4008af03, &(0x7f0000000100)=0x40) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) 22:08:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0xba03}], 0x1}, 0x0) 22:08:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x1000000, 0x0) 22:08:05 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80002, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x4, 0x0, 0x4}}, 0x30) [ 1663.578707][ T6365] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1663.591819][ T6365] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1663.622719][ C1] net_ratelimit: 23 callbacks suppressed [ 1663.622726][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1663.622755][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1663.628502][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1663.628571][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1663.651420][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:08:06 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f00000003c0)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000d40)=ANY=[@ANYBLOB='\x00'], 0x1) r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") setsockopt$sock_timeval(r1, 0x1, 0x41, &(0x7f0000000080), 0x10) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x5d) [ 1663.682147][ T6365] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1663.692709][ T6365] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:08:06 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x22e, 0x0) 22:08:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x2000000, 0x0) 22:08:06 executing program 2: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0xffffffffffffffff) ioprio_get$pid(0x0, 0x0) ioctl(r0, 0x0, 0x0) setpriority(0x0, r1, 0x10000) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(0x0, &(0x7f0000000540)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x1) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000000)={0x5, 0x80000000, 0x7, 0x10000}, 0x8) r3 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0xfffffffffffffffc, 0x40100) ioctl$KVM_GET_ONE_REG(r3, 0x4010aeab, &(0x7f0000000200)={0x4, 0xffff}) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000002c0)=[{}, {0x0}]}) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f0000000440)={r4, 0x1}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x400, &(0x7f0000000380)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@metacopy_off='metacopy=off'}], [{@smackfshat={'smackfshat', 0x3d, '/dev/adsp#\x00'}}, {@audit='audit'}]}) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000000c0)={0x3}, 0x4) getegid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getgid() pivot_root(0x0, &(0x7f0000000580)='./file0\x00') setsockopt$inet_int(r2, 0x0, 0x0, &(0x7f0000000080)=0x7f, 0x4) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000040)=0x5, &(0x7f0000000140)=0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) [ 1663.887424][ T6375] overlayfs: filesystem on './file0' not supported as upperdir [ 1663.898138][ T6482] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1663.918334][ T6482] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1664.005239][ T6482] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1664.026272][ T6482] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1664.046590][ T6490] overlayfs: unrecognized mount option "smackfshat=/dev/adsp#" or missing value 22:08:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf00512cb9c97b64226b7cda8bd329636d6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x400}], 0x3000000, 0x0) [ 1664.161716][ T6499] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1664.171690][ T6499] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1664.235865][ T6499] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1664.262704][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1664.262709][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1664.262756][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1664.268481][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1664.268677][ T6499] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:08:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x2}, 0x0) 22:08:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0xca03}], 0x1}, 0x0) 22:08:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x200000000000011, 0x3, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000300)={@mcast2}, &(0x7f0000000340)=0x14) r2 = accept$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0}, &(0x7f0000000400)=0x14) r4 = accept$packet(r2, 0x0, &(0x7f0000000440)) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'bridge_slave_0\x00', r3}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x800) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$KVM_IRQFD(r6, 0x4020ae76, &(0x7f00000002c0)={r8, 0x77, 0x14, r6}) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) io_setup(0x7, &(0x7f00000000c0)=0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000500)={{{@in, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000000600)=0xe8) io_submit(r9, 0x84, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000640)="caf419d79b4d133b24da23b0af98b33e0b8c27275b94f69dd951a3e066b3d4b2baebfc07515182613c778f4d7075f052530cd66b0a25273d5cb92d0ef199e9d39991a8dd006d8d7ef6af39dd9164f37eb9c98e3069976e9ff656dc9abd8dfb56d27e969b5cfd1389b2187432ed0763e3dc06eac7272b1f32867b10262134fe0674298108dfd07fcdb8ed567c14e589dbc620"}]) setsockopt$inet6_int(r8, 0x29, 0x10, &(0x7f0000000480)=0x3, 0x4) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r8, 0x40305652, &(0x7f00000004c0)={0x3, 0x5, 0x2, 0x4, 0x1, 0x3f}) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x5, 0x5, 0x9, 0x8, 0x0, 0x7ff, 0x0, 0x1, 0xfff, 0x4, 0x4, 0x1, 0x3, 0xc, 0x2, 0x5, 0x0, 0x0, 0x2, 0x400, 0x8, 0x3, 0x8001, 0x7f, 0x7, 0x1000, 0x2, 0x9, 0x4, 0x1ff, 0x1, 0x0, 0x101, 0x5, 0x6fd4be7f, 0x6, 0x0, 0x200, 0x4, @perf_config_ext={0xffffffffffff8001, 0x8}, 0x0, 0x3, 0x9, 0x9, 0xfffffffe00000000, 0x7, 0x5}, r10, 0x6, r1, 0x0) 22:08:06 executing program 3: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffc) lstat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r2, 0x0) r3 = shmget$private(0x0, 0x1000, 0x1000, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r3, 0xb) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setresuid(0x0, 0xee01, 0x0) write(r1, &(0x7f0000000100)="ed", 0x1) userfaultfd(0x80000) mkdirat(r1, &(0x7f0000000000)='./file0/file0\x00', 0x34) 22:08:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x4000000, 0x0) 22:08:07 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000005c0)={'nat\x00'}, &(0x7f00000003c0)=0x54) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000740)='/proc/capi/capi20\x00', 0x400001, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmp(0x0, 0x3, 0x0) add_key(&(0x7f0000000440)='pkcs7_test\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, &(0x7f0000000580)) getegid() ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@ipv4={[], [], @multicast1}, @in=@dev}}, {{@in=@broadcast}}}, &(0x7f0000000b00)=0xe8) r3 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00', 0x3) ioctl$UI_END_FF_ERASE(r2, 0x400c55cb, &(0x7f0000000280)={0x4, 0x2}) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000040), &(0x7f0000000100)=0x10) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000640)="a8"}], 0x1, 0x81003) getresgid(&(0x7f00000002c0), &(0x7f0000000400), &(0x7f0000000680)) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) sendfile(r0, r1, 0x0, 0x102000002) [ 1664.514701][ T6626] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1664.549621][ T6626] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1664.604183][ T6626] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1664.619629][ T6626] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:08:07 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff40000000bfa100000000000065010000f8ffffffb702000000000000bf130000000000008500000004000000b7000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xfffffffffffffffd}, 0x48) 22:08:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x5000000, 0x0) 22:08:07 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x22f, 0x0) 22:08:07 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x90) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x4, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0e630c40"], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0xaf14113f02c18c41, 0x0, &(0x7f0000000680)}) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000140)={0x0, 0xdf, 0x10, 0x9, 0xead}, &(0x7f0000000180)=0x18) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000001c0)=@assoc_id=r4, &(0x7f0000000200)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0xffa3, 0x0, &(0x7f0000000480)=[@dead_binder_done], 0x207, 0xfdfdffff, 0x0}) 22:08:07 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000005c0)={'nat\x00'}, &(0x7f00000003c0)=0x54) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000740)='/proc/capi/capi20\x00', 0x400001, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmp(0x0, 0x3, 0x0) add_key(&(0x7f0000000440)='pkcs7_test\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, &(0x7f0000000580)) getegid() ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@ipv4={[], [], @multicast1}, @in=@dev}}, {{@in=@broadcast}}}, &(0x7f0000000b00)=0xe8) r3 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00', 0x3) ioctl$UI_END_FF_ERASE(r2, 0x400c55cb, &(0x7f0000000280)={0x4, 0x2}) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000040), &(0x7f0000000100)=0x10) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000640)="a8"}], 0x1, 0x81003) getresgid(&(0x7f00000002c0), &(0x7f0000000400), &(0x7f0000000680)) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) sendfile(r0, r1, 0x0, 0x102000002) [ 1664.765848][ T6745] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode 22:08:07 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'rose0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x1c, &(0x7f0000000000)=ANY=[@ANYBLOB="b46ee7e0558959cb120000000000000000000000d9b07856984eee51cd32697e19b3cccb9985b7546ea2bc95cdfe00deb4899dc3a84c09901116505e80d89c8d07ae9da6adeceb3a31db312e354622e2e517d1ca15e3528e673bad9af12c16b1bd7bc7231c7bd8f49edbc8d8ee65214077131667a8a5269e12969ae4a76bd0ef57b8c7fdde73f47f10437a8666cd26adc008aa371b1cef9e7b6895b7afe839ef877bfa3e9f8fdb1b9fc1abb316ef8a3f55cf31ead15b26e50df4e4460903f3ecdedee0a7db9a1fea8f122fb33cc9fc8e66738710d3ba2f43b091e018f113144e04d53e3895"], &(0x7f0000000100)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], r0}, 0x48) [ 1664.838849][ T6745] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1664.875555][ T6757] binder: 6755:6757 unknown command 0 [ 1664.955574][ T6745] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1664.988625][ T6745] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:08:07 executing program 2: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000040000001) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000680)={'veth0_to_bond\x00', 0x0}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000003e40)={0x0, @remote, @loopback}, &(0x7f0000003e80)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000003ec0)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000003f00)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@loopback}}, &(0x7f0000004000)=0xe8) getsockname$packet(r0, &(0x7f0000004100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004140)=0x14) accept4$packet(r0, &(0x7f0000004180)={0x11, 0x0, 0x0}, &(0x7f00000041c0)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000042c0)={'team0\x00', 0x0}) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000440)={0x43, 0x4, 0x1}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000004400)={{{@in=@initdev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000004500)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000004540)={{{@in6=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000004640)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000004940)={&(0x7f0000000000), 0xc, &(0x7f0000004900)={&(0x7f0000000100)=ANY=[@ANYBLOB="64020000", @ANYRES16=r1, @ANYBLOB="000126bd7000ffdbdf250200000008000100", @ANYRES32=r2, @ANYBLOB="ec00020038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000008000300030000000800040021b8000038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r3, @ANYBLOB="3c0001002400d8619342db3f5a1b7ef9ac0c7e58be08de6162846564000000000000000000000f5c000000000000000000000039b1b18b61c400000800030006000000045c87f2200006000d196f0d001ed259f57c576807b0a1d6c13ef3056040bd0e4f5d0fb24325d36f3beffd2a13423808db6bfe0346a1b169964db685c146b809b45fa99dbcc6e660a0f8ea888d745d9df69bb225828e7a293e71246d57effec7ba20c47a998b10e7b709855aa4134175b9360bb61948a4cce391ab4b4e847441062c49a7701399d4b5e20ae0afd5161fe0df0f7ffac4c273de8f1a32c15ccc12193c4c1a70d7115715d7d02b649a4832", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="3c0002003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="500002004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000008000100", @ANYRES32=r8, @ANYBLOB="b800020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400ffffffff08000600", @ANYRES32=r9, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400040000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r10], 0x264}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045519, &(0x7f0000000080)) [ 1665.062754][ C0] protocol 88fb is buggy, dev hsr_slave_0 22:08:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x33ff0}], 0x1}, 0x0) 22:08:07 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f00000000c0), 0x8) listen(r0, 0x0) shutdown(r0, 0x1) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200041, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r0}) ioctl$RTC_IRQP_READ(r4, 0x8008700b, &(0x7f0000000140)) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f0000000380)) r6 = fcntl$dupfd(r0, 0x406, r0) r7 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x10000, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8100000}, 0xc, &(0x7f0000000300)={&(0x7f0000000440)=ANY=[@ANYBLOB="94000000", @ANYRES16=r2, @ANYBLOB="00042dcd7005009c96d2ae0000000c00180001ad8245b70000000c0008001600002b000000000c0008007f00000000af9d0ce1797bdf66a17c2c51e60000001c00070011000100336fae0a381e8ea425452a9bf65ea3745faa7cbc1c250b9a6afdab50e1195be6264eeee16f725eaa80", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="0c0002007f000000000000000c0002005c0b0000000000001400070008000100", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="0c00060001000000000000000800010000000000"], 0x94}, 0x1, 0x0, 0x0, 0x800}, 0x14) poll(&(0x7f0000000040)=[{r0}], 0x0, 0x0) 22:08:07 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x230, 0x0) 22:08:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x4}, 0x0) 22:08:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x6000000, 0x0) 22:08:07 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') creat(&(0x7f0000000f00)='./file1\x00', 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file1\x00', 0x2) [ 1665.296812][ T7080] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1665.307590][ T7080] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:08:07 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000180)) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000340)={0x2, 0x0, [{0xfff, 0x7, 0x0, 0x0, @sint={0x1ff, 0x80000000}}, {0x4, 0x3, 0x0, 0x0, @msi={0xfffffffffffffe00, 0x8000, 0x7}}]}) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f00000001c0)={0x6, 0xa6b, &(0x7f00000000c0)="2c0fbc80fbb9a90eec8870055d068c8a1e4aed37fb7be65a9c48e7e6e176c2788a9b16c1e2cf6a605412e35deaf98854c823c1d4510213f133279ded93077b9618826da0e027c8ebf364fc73e6839efb1571d2d7ad05d41fa2203e599cf1fc522b23e299e3719055b767e6de3ea7ee170b135f8a99c529738faab5634fcd27387b9b2c2ee9b427ff937af82d12f582d9457264f4bf6383ac19df301e58d8874724", &(0x7f0000000200)="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", 0xa1, 0x136}) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) ioctl$int_out(r0, 0x800080804521, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000003c0), &(0x7f0000000400)=0x4) 22:08:07 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) tee(r0, r0, 0x1ff, 0x1) connect(r0, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x400, 0x0) connect$vsock_stream(r1, &(0x7f0000000140)={0x28, 0x0, 0xffffffff, @host}, 0x10) r2 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x1, 0x40000) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000180)={@empty, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in=@broadcast, 0x4e24, 0x80000001, 0x4e23, 0x9, 0x2, 0xa0, 0x0, 0x89, r3}, {0x0, 0x10001, 0x4, 0x9, 0x6, 0x7, 0x1, 0xe9f80000}, {0x8, 0xe, 0x1}, 0xfffffffffffffffe, 0x6e6bbd, 0x2, 0x0, 0x0, 0x2bfdc383c7f3664c}, {{@in6=@ipv4={[], [], @multicast1}, 0x4d2, 0x32}, 0xa, @in=@empty, 0x0, 0x1, 0x1, 0x8, 0x20, 0x0, 0xa0b2}}, 0xe8) accept4$netrom(r2, &(0x7f0000000200)={{0x3, @null}, [@bcast, @default, @bcast, @default, @netrom, @netrom, @rose, @default]}, &(0x7f00000000c0)=0x48, 0x1) 22:08:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x7000000, 0x0) 22:08:07 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000880)={0x10, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB, @ANYPTR, @ANYPTR], 0x0, 0x0, 0x0}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, 0x0, &(0x7f0000000000)=0xfffffffffffffcaf) perf_event_open(&(0x7f00000008c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f00000006c0), 0x0, 0x100002, 0x0, 0x0, 0x0) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f00000009c0)={@null, @null, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast]}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r2 = syz_open_dev$sndpcmc(0x0, 0x7fff, 0x30000) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f00000000c0)) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140)={0x1d, r1}, 0x10) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000300)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff3000/0xd000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000000240)="a2cbcdd4ce0d3209b786e12232bdf73bd5e4e7a7d5352cb6c05a2d0e975e91137a19d1d2db03e004dbdbe5cae272328176e3c72f910ad39a041483382c58b7e400c19966ab4f846f93c275712c76c7b4cd0b0701d72880d03bbb4a90b2216c3930c4b1bbe79efb4f6c424fdb1caee4623021be3f5bc815c5cf16c5a9daa0611d0da51ef5cc100e2a25c04318188fe1cfc80a3c691278d4e321d4a72baef5dd507b8b88c21b124c75bf", 0xa9, r2}, 0x68) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/capi/capi20ncci\x00', 0x40500, 0x0) sendmmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000001b80)=[{&(0x7f0000000a80)={0x27, 0x0, 0x1, 0x0, 0x174c, 0x2, "1ddc37787121faccc97cc16d89ea3349ddb1882abc4761f38bc41e881d0b3f2213adefd7dccb3508d318002f25dd536138a77dbfd649633be43e9de500a940", 0x1f}, 0x60, 0x0, 0x0, 0x0, 0x0, 0x1}], 0x1, 0xc800) getsockopt$llc_int(r2, 0x10c, 0x5, &(0x7f0000000100), &(0x7f0000000380)=0x1ea) unshare(0x40000400) [ 1665.411349][ T7080] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1665.433193][ T7080] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:08:07 executing program 3: recvmsg(0xffffffffffffff9c, &(0x7f0000001500)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/34, 0xfffffffffffffedf}, {&(0x7f00000000c0)=""/11, 0xb}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000000100)=""/59, 0x3b}, {&(0x7f0000000140)=""/66, 0x42}, {&(0x7f0000000280)=""/152, 0x98}, {&(0x7f0000000340)=""/229, 0xe5}], 0x7, &(0x7f0000000440)=""/34, 0x22}, 0x2) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x14, &(0x7f0000001600)={@empty, 0x0}, &(0x7f0000001800)=0xffffffffffffff9a) fstat(0xffffffffffffff9c, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001700)={{{@in=@dev={0xac, 0x14, 0x14, 0x1d}, @in6=@remote, 0x4e23, 0x0, 0x4e23, 0x1, 0xa, 0x20, 0xa0, 0x2d, r1, r2}, {0x401, 0xffffffff, 0x7, 0x6, 0x86e, 0x1, 0x8, 0x9a8}, {0x4, 0x0, 0x9, 0x1}, 0x3, 0x0, 0x1, 0x0, 0x1}, {{@in6=@mcast2, 0x4d4, 0xff}, 0xa, @in6=@remote, 0x3501, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1f}}, 0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xa, 0x4, &(0x7f0000001540)=ANY=[@ANYBLOB="180000f4ffffffffffffff000000000063012000000000009500000000000000e0fd4a97fce20d4667fe66e2e615dc7f15e0f78fec865ca1162622e1852e8020209df864b168b453e6f79b17f202e8bf0ff64850f039d129ff23b96603b46c5f3690da9904e24cafeff101e1858578ecc8d681891f79a71e6d32c164bcabf53e67ec535b2d223f96651e76859f8b06bbadca8ced92d5ab335186f00273e4c0c2eede391db0b4291e975915afaaff"], &(0x7f0000000240)='GPL\x00'}, 0x48) [ 1665.616574][ T7166] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1665.650386][ T7166] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:08:08 executing program 3: pipe(0x0) r0 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8001}, 0x0) [ 1665.805705][ T7166] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1665.819318][ T7166] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:08:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x200033c0}], 0x1}, 0x0) 22:08:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf00512cb9c97b64226b7cda8bd329636d6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x400}], 0x8000000, 0x0) 22:08:08 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x231, 0x0) 22:08:08 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x806d, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x40084502, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xbaa, 0x20000) recvmmsg(0xffffffffffffffff, &(0x7f0000002080)=[{{&(0x7f0000000080)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000001380)=[{&(0x7f0000000100)=""/119, 0x77}, {&(0x7f0000000180)=""/4096, 0xfffffffffffffe7e}, {&(0x7f0000001180)=""/131, 0x83}, {&(0x7f0000001240)=""/15, 0xf}, {&(0x7f0000001280)=""/245, 0xf5}], 0x5}, 0x3}, {{0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000001400)=""/232, 0xe8}, {&(0x7f0000001500)=""/154, 0x9a}, {&(0x7f00000015c0)=""/37, 0x25}, {&(0x7f0000001600)=""/145, 0x91}, {&(0x7f00000016c0)=""/26, 0x1a}, {&(0x7f0000001700)=""/253, 0xfd}], 0x6, &(0x7f0000001880)=""/223, 0xdf}, 0x2}, {{&(0x7f0000001980)=@sco, 0x80, &(0x7f0000001b80)=[{&(0x7f0000001a00)=""/31, 0x1f}, {&(0x7f0000001a40)=""/130, 0x82}, {&(0x7f0000001b00)=""/74, 0x4a}], 0x3, &(0x7f0000001bc0)=""/26, 0x1a}, 0x5}, {{&(0x7f0000001c00)=@rc, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001c80)=""/228, 0xe4}], 0x1}, 0x8}, {{0x0, 0x0, &(0x7f0000001e00)=[{&(0x7f0000001dc0)=""/26, 0x1a}], 0x1, &(0x7f0000001e40)=""/57, 0x39}, 0x3}, {{&(0x7f0000001e80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000002000)=[{&(0x7f0000001f00)=""/54, 0x36}, {&(0x7f0000001f40)=""/171, 0xab}], 0x2, &(0x7f0000002040)=""/43, 0x2b}, 0x740}], 0x6, 0x10100, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002200)={{{@in6=@ipv4={[], [], @loopback}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000002300)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000002340)={{{@in=@multicast2, @in=@remote, 0x4e23, 0x7fff, 0x4e22, 0x7fff, 0x2, 0xa0, 0xa0, 0x2c, r2, r3}, {0x5c45, 0x9, 0xfffffffffffffff8, 0x1, 0x31c, 0x6, 0x7, 0x6}, {0x2, 0x200, 0xa00000000000, 0x7fffffff}, 0x2, 0x6e6bbd, 0x1, 0x0, 0x0, 0x3}, {{@in6=@loopback, 0x4d4, 0x3c}, 0x2, @in6=@local, 0x34ff, 0x2, 0x1, 0x1ff, 0x26, 0x7, 0x3}}, 0xe8) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000002440)={'filter\x00', 0xea, "7cfb2507337bb58c68c904f22f7ebc82e5e57d304f9eab57ad080bbd06d86f22bdbb339202e2449be58ac401283e1a6dbb840cd66faecbb99e7bbf58cca3091b2ba1f26fc5dc42187d5b9adc0ede6bdc0d54d7a5dc8d64d55114a2d6ab26f8d0cd759ba34a52189db105728889090ee329d9cd3720e0d005386135ddeebfa3c181ef04faaa0091fde2bb5398cbd274c2f339408e0bbdbc27784ea33ea8d912fcf1bc55d42c6032b1137667f3630c2b9bf6e0a81bbbaea4511cb37fb3e2d0639035db22fa3eafe41fa0e16b59d2a6794e7db657f0c575d2fb56040dad4d9ffd5f945a8009ccba1daabac0"}, &(0x7f0000002580)=0x10e) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) 22:08:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x8}, 0x0) [ 1666.224477][ T7335] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode 22:08:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) pwrite64(r1, &(0x7f0000000580)="7b5aa60acc88c08616733e70363856ede11e206a4b96d78ee276a11ae5e6f50ffcb759a388ffd05db6fd28f3ce796952fdf350273514743ff2c0ba06775532a146ebd4f4b5145717349e424c127d26a3facb75c7d0cab4585392597655f56cb9287374d2ae9d0c99d64dd24049cfd2e5329dc672bd78ba3ec3df635b6b148bb9dba456aef169352247503b247496c609af0d31a99db27980aa8de80480da12bf8720aca1e7e2ae0624a8ae60a33f7b4d7400b4ec5a17039439f0fb8f4af94a5b7dec6deb9f685384d0c81ea03f5a3b8e998671149a859b7859637504b283adc687006ef7118d619274c5dba11e81a1d2fb030533501904484e30ad1c57be7489dc4471aae0a8765e67a8b3e9bf1960f84c32c0da7437eb743a5e5f4ec7318f132e3992af170253c13e4d6fece04dd5bae1fef171796db16d566e47a4691ac13a75370ce8cc1370b7d6a4aee09d97a437fc4c7c2f341e3761d3db0ef4ec4d9c829a6e9bf2ae18e65f3163d5055f0f68f816f88ef27ccbd1c696c4d5b41528fe54bcdfeba85f7ea6d05691c6930a476ad4a9d7352ec2da80e52e716d7b3f61fc9fed452c9831b1b245ae6c6bdaa3ffaaae38950747ec6acf69175ead5c88931206ff941b9a829e6752b5ffe80cc1cf83eb33ecaee7298a45cbb1b6466f34edf1a1d7feb4d5180bf10eeafb60640b4ae8c02469ad00c69afda62824921e7095796a", 0x200, 0x0) fcntl$setstatus(r1, 0x4, 0x4401) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000100)={@ipv4={[], [], @local}, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x100000001, 0x100000001, 0x7fffffff, 0x100, 0x0, 0x84, r2}) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f0000000080)) io_setup(0x9, &(0x7f0000000040)=0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000240)) io_submit(r3, 0x33, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) [ 1666.277051][ T7335] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1666.406145][ T7335] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1666.443299][ T7335] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1666.454936][ C1] print_req_error: 359 callbacks suppressed [ 1666.454946][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1666.467988][ C1] buffer_io_error: 359 callbacks suppressed [ 1666.467997][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1666.496939][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1666.504100][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1666.513745][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1666.520911][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1666.542020][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1666.549222][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1666.557968][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1666.565151][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1666.578518][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1666.585721][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1666.588865][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1666.601015][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1666.602368][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1666.616142][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1666.630779][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1666.637931][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 1666.638640][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 1666.653137][ C1] Buffer I/O error on dev loop0, logical block 0, async page read 22:08:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x9000000, 0x0) 22:08:09 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f000000de40)={0x0, 0x0, &(0x7f000000dd00)=[{&(0x7f000000d6c0)=""/239, 0xef}, {&(0x7f000000d7c0)=""/253, 0xfd}, {0x0}, {0x0}, {&(0x7f000000dac0)=""/205, 0xcd}, {0x0}], 0x6}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x522000000003, 0x11) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x8) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0x5, 0x2, 0x1, 0x725, 0x1, 0x400, 0x6, 0xffffffffffffffff, 0xd7, 0x8, 0xfffffffffffffff9, 0x6}) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) [ 1666.852488][ T7400] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1666.876706][ T7400] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:08:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x1, 0x1b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000fcffffff0000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000010000000000000000000000000000000000000000000000000000000000ffffffff01000000090000000000000000006272696467655f736c61763c76a30c00766574683100000000000000000000007665746830000000000000000000000073697430000000000000000000000000000000000000000000000000ffffffffffff000000b4ac000000e0000000e00000000073747000000000000000000000000000000000000000000000000000000000004800000000000000000000000000000000009aaaaaaaaa000000000000000000000000000000000000000000aaaaaaaaaa0000000000000000000000000000492adeb1000000000000000000600000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a30000000000000000000000000000000030000000000000000000000000000006094d048a18a7f303e7fbdeb30860081d78aa1acc901685470867c065fb32975ea573019d64bead29216ba9e1dd357862942858bddc8051c8a976ab723f2e6dc1100a51615091d674790deef6c2a1008601b90"]}, 0x283) [ 1666.975305][ T7400] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1667.008463][ T7400] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:08:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0xa000000, 0x0) 22:08:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x7ffff000}], 0x1}, 0x0) [ 1667.094057][ T7630] kernel msg: ebtables bug: please report to author: Wrong len argument 22:08:09 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fadvise64(r0, 0x0, 0x3, 0x5) fallocate(r0, 0x0, 0x0, 0x8001) truncate(&(0x7f0000000040)='./file0\x00', 0xfff) 22:08:09 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x232, 0x0) [ 1667.219935][ T7691] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1667.262753][ T7691] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:08:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x20000000, 0x0) [ 1667.347899][ T7691] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1667.379592][ T7691] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:08:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f00000004c0)="004dde0301b3d8a52150dbf7f3649aa4a133b1b47392870e2defc66e389f1912e8d05566b4faa7040cc60d103d385210cae9cc080462938353aeb457646991644a3fe726a1063c39e41d570890b0d9256e0b19698ef7213a67bcfc7af200080000f071991224ad9524b280b9fa224a833ea0cc3c5a51d5d20acd5aa3a5926c8079170000000000000000000000000054db45165107b9c877a83a6bfaf6f33a59150445c45cc59c3a967d69ac571153aebd8ecb5724a39784673c37c977e61cc6", 0xc0, 0xfffffffffffffffe) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000300), 0x10) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x2, 0x109802) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000580)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x1c, r2, 0x14, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000800) r3 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000380)={'syz'}, &(0x7f00000001c0)="bc", 0x1, 0xffffffffffffffff) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="323e003ad7925412c58d10e166b8f8e2b2629830387f000000000000000000000000000000"], 0x400) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000140)={0x5, 0x0, [{0x100000001, 0x0, 0xd97}, {0x1ff, 0x0, 0x80}, {0x3ff, 0x0, 0x5}, {0x31a0, 0x0, 0x101}, {0x1, 0x0, 0x2}]}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000880)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f0000000640)={0x1f0, r4, 0x104, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8000}]}, @TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xbf0}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x901d}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7353}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5be}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x225}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0xf8, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb02c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1b99}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffe}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1cf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8674}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}]}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x81}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x400}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3ff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}]}]}, 0x1f0}}, 0x4000) keyctl$dh_compute(0x17, &(0x7f0000000440)={r3, r0, r3}, &(0x7f0000000080)=""/92, 0x202, &(0x7f0000000200)={&(0x7f0000000100)={'poly1305-simd\x00'}, &(0x7f0000000000)}) 22:08:10 executing program 3: arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000001c0)=@in6={0x2, 0x0, 0x0, @local}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0xa, 0x3, 0x3a) setsockopt(r0, 0x1ff, 0x6, &(0x7f0000000640)="21f730fd84795a9a57e6facacd7a66c62e2a21a3fcbf8db19dbbf8791fd4f3e945968be9b56c04ba8cae958bad0d2fe1c78a199b9b5339d05366782b19d173989a73736841c8b95aad25b9941b32ef6a6d09c789705b60ecd21ab645b2ab545e3619c2ba4f34ef72198241c465e3cbedd0b2ecc4dda09e98c8c40967cbfde9ece528fd8b6f37de6c466a10db75619ae538", 0x91) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000001c0)=@nl=@unspec, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)="80d2", 0x2}], 0x1}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f00000002c0)=@nl=@unspec, 0x80, &(0x7f0000001500)=[{&(0x7f0000000500)="fecc858bd4ec", 0x6}], 0x1}, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000004c0)='/dev/vbi#\x00', 0x0, 0x2) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000001180)={0x88, @rand_addr=0xa5f, 0x4e21, 0x0, 'sh\x00', 0x8, 0x6, 0x7f}, 0x2c) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000440)={0xb19, 0x1e26, 0xa3ac}) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000340)="8b3fe2ab07ef9f7a26826e370991f4430a4e5beecc70ad98d02c72d720c81a213557c5b0e5a9360ca08bfaed77153ca14264c2d6d355c35a13bc4fc35975efef9b23f5c0f35c81b898608d76e5fe49a999c03ca7a7f488ae7df0344b1254114dc2eaaaec6252c44f04246f65ae6fce5c968834088d95907a1becbf238802885e4bfa98b339ec7f6e3344066fde6986696ad671d346810e2895f8f3a70ef95c46f93b704176ee0e8482f117713eec6c6c54417b25ab37c7b61199bfd215a0f7e554bcc414", 0xc4}, {&(0x7f0000000540)="84c412180885f8f35cd86029395f24c3df05c986e86dfaff31c2d3afb40e4aea07ed342aca12cfb79ea092cbb450b8d3d24cd05b03c742952c157d9bc4f7b7bd7d421de1910d1b0fb369dd5b952bbad170ddb6b7495904cfa3272aee3d5a254254111faa292f108d90f431aec9be92f7d60a0020546e80e2f6bfec1e83831ac97486463e4a6c8b2b80ba18a9acf96fac36a3cfdf71814a1076120a6d831618ca7898e841c3d82b5c5f545b742ea5d5233152439fd190a83849b78efec6f01b31749dae87a4fa6628a8bfe0822fc9fc724e914e1cd842a7b05b47e3762a8681ba14e0e5e63f85e106bb891d99d0d64636b00e", 0xf2}, {&(0x7f0000000040)="f1fcd79df354c353af4ce391b77aee2f5892a757987e31af6b0a58c9cfafe4aa1e3f97112f2fe7527be4b0a0a70be61180d7b12223a9afc0b4b460ff110a9b715af0bf23c8b19b2ccfe0d19cc5a94a58b05a7fb53e24", 0x56}, {&(0x7f0000000180)="726ceb6c71d5a264892269a44107a26b4b1cd975d620b79e8a35a67020e59f5b8f9db48ba2f1ebd50ff4f8e259de", 0x2e}], 0x4) [ 1667.525882][ T7731] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1667.556022][ T7731] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:08:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0xa}, 0x0) [ 1667.657524][ T7731] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1667.684517][ T7731] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:08:10 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000001bc0)=0x16c, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0xfe02) sendto$inet(r0, 0x0, 0x0, 0x40, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0xc4fb06b8) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x6846de70341668c9) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x5, &(0x7f0000000380)=[{&(0x7f0000000400)=""/199, 0xfffffe80}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000340)=""/42, 0x2a}], 0x3, 0x0, 0x181, 0x200d00}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0xf43185f1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") 22:08:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x20100000, 0x0) 22:08:10 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x3, 0x0) r1 = creat(&(0x7f0000000500)='./file0\x00', 0x800000) setxattr$trusted_overlay_opaque(&(0x7f0000000600)='./file0\x00', &(0x7f0000000440)='trusted.overlay.opaque\x00', &(0x7f0000000680)='y\x00', 0x1, 0x0) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f00000012c0)='y\x00', 0x2, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) futex(&(0x7f00000002c0), 0x8d, 0x0, 0x0, 0x0, 0x2) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) write$eventfd(r1, &(0x7f0000000340)=0x80000000, 0x8) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RSTAT(r1, &(0x7f0000000540)={0x8a, 0x7d, 0x2, {0x0, 0x296, 0x0, 0x3, {0x0, 0x2}, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffe56, '/mime_typenodev(security^', 0xf, 'nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x1d, 'eth0ppp0GPL!#!selinuxsystem-}', 0xb, 'GPLnodev*lo'}}, 0x1e) write$cgroup_subtree(r1, &(0x7f00000003c0)={[{0x2f, 'rdma'}, {0x2b, 'memory'}, {0x2f, 'io'}, {0x2d, 'pids'}, {0x2f, 'rdma'}, {0x2f, 'pids'}, {0x0, 'cpu'}, {0x2d, 'io'}]}, 0xfffffffffffffed0) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x5, 0x800) openat$cgroup_type(r2, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000040)) 22:08:10 executing program 3: sysfs$2(0x2, 0x5, &(0x7f00000003c0)=""/4096) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4100, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x1, r2, 0x3c, 0x0, @in6={0xa, 0x4e22, 0x20, @rand_addr="b11ff54b77cfd12c890e3f6563c0dfa1", 0x4}}}, 0xa0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'ve\xfa\xfd\x00\x00\x00\x001\x00', 0x43732e1398416f1a}) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f0000000240)={0x3, 0x9, 0x20000000000}) remap_file_pages(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x37, 0x100043) ioctl$TUNSETTXFILTER(r0, 0x400454e2, &(0x7f0000000080)) 22:08:10 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = fcntl$getown(r0, 0x9) r3 = syz_open_procfs(r2, &(0x7f0000000200)='ns\x00\xf0\x1a\xa1_\x90\xfd1\xda$\x96\x93.\x02\xa06*\x0f5\x9d\x9cE^\x1d\xaf\xe5\xc0G\x8c\xa0^\x8b\x89\xf2\xebm\x86\x8b\xf9\x97J\xb7\xbf/\xe3\x963\x99)\x01\xcc\x93\xa3\xa3V~`R@F\xc5\x13\x84\x8b\x0e\x8a\xc3\x9bI<\x9eTe\x9a\xbe\x85\xbe\x80\xe3\x80#\xb9P\xda{\xa4\x8d\xdc\x9dv\x8b\xfe\x9d\xf2\x15\x10A\xd8B\xd7\xa4\"4\xa8\xe4\x91b\xe3\x97\xbb]\x14\f\xb1\x8dj\xe4\\{\xf0\'\x04L\x00\xab\xda\v\x15') write$UHID_DESTROY(r3, &(0x7f0000000000), 0x4) connect$pppoe(r3, &(0x7f00000000c0)={0x18, 0x0, {0x0, @dev={[], 0x22}, 'gretap0\x00'}}, 0x1e) getdents(r3, &(0x7f0000000040)=""/46, 0x389) 22:08:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x2}, 0x0) 22:08:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x40000000002, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001540)="2e000000110081aee405d10200000e00fa076b000800000000f3ff500befccd77f00000000081c5eda00b0eba06a", 0x2e}], 0x1}, 0x0) sendto$rxrpc(r0, &(0x7f0000000280)="1fe63682341f5565744aec461c1885316794972382dd1d75707cea98e0c5a4035d786ece04dc3edbd3f3880d4340763c4f0e2f2d30a38a77c4797ec65a47a6c4fc99e7b5e393500a840f4e914176f89d", 0x50, 0x0, &(0x7f0000000300)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e22, @multicast2}}, 0x1c2) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000140)) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x2, 0xffff, 0x9, 0xa, 0x9}, &(0x7f0000000080)=0x14) accept$unix(r1, &(0x7f0000000340)=@abs, &(0x7f0000000200)=0x6e) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000100)={r2}, 0x8) 22:08:10 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x233, 0x0) 22:08:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x23000000, 0x0) 22:08:10 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x6, 0x0) write$P9_RREMOVE(r1, &(0x7f0000000100)={0x7, 0x7b, 0x1}, 0x7) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x37) syz_open_procfs(0x0, &(0x7f00000003c0)='net/unix\x00') syz_open_dev$vcsa(0x0, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = getpgid(0x0) fcntl$setown(r2, 0x8, r3) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000180)="0f00db670f01df66b8000000000f23d80f21f86635400000f00f23f80f09b800008ee00f009a00000f212b0f01c30f21b00f1af9", 0x34}], 0x1, 0x10, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) msgctl$IPC_INFO(0xffffffffffffffff, 0x3, 0x0) syz_genetlink_get_family_id$team(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r5, 0x4048ae9b, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) socketpair$unix(0x1, 0x1000000001, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 1668.155163][ T8003] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1668.235207][ T8019] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1668.259235][ T8016] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1668.295526][ T8019] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:08:10 executing program 3: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x140, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000007, 0x11, r0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) ftruncate(0xffffffffffffffff, 0x88200) write(0xffffffffffffffff, &(0x7f0000000a00)="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", 0x800) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000000)={{0xff}, 'port1\x00', 0x0, 0x801, 0x40, 0x8, 0x10001, 0x100000001, 0xb2c4, 0x0, 0x5, 0x100}) [ 1668.362436][ T8019] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1668.372989][ T8019] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:08:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x10}, 0x0) 22:08:11 executing program 2: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$key(r1, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f00000022c0)={&(0x7f0000002c00)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000000c0)={0x8}, 0x20) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x1}, 0x8) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000080)=0xa04c, 0x4) sendmsg$kcm(r1, &(0x7f0000000100)={0x0, 0xfffffffffffffd43, &(0x7f0000000000)=[{&(0x7f0000000040)="1d", 0x2ae}], 0x1}, 0x0) 22:08:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x2d000000, 0x0) 22:08:11 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {0x0, r1, r0}}, 0x18) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r5 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r5, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x80001, 0x0) ioctl$UI_SET_KEYBIT(r6, 0x40045565, 0x1e3) syz_open_dev$vbi(&(0x7f0000000240)='/dev/vbi#\x00', 0x0, 0x2) setsockopt$XDP_UMEM_REG(r5, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x2000, 0x1000}, 0x48) setsockopt$XDP_UMEM_FILL_RING(r5, 0x11b, 0x5, &(0x7f00000008c0)=0x8, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r5, 0x11b, 0x6, &(0x7f00000002c0)=0x80, 0x4) bind$xdp(r6, &(0x7f0000000340)={0x2c, 0x2, r4, 0x2a, 0xffffffffffffff9c}, 0x10) ioctl$KVM_GET_XSAVE(r6, 0x9000aea4, &(0x7f0000000480)) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x20001, 0x0) ioctl$KVM_GET_MSRS(r7, 0xc008ae88, &(0x7f0000000140)={0xa, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) 22:08:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000000)={0x9}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300de56b5000000000800000000080008000100000008000500ac14141b080003000100000f01"], 0x1}}, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x100, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x4e20, 0x40, @empty, 0x4}, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x2}, 0x6, [0xa7, 0x1, 0x8, 0x1000, 0x0, 0x3f, 0x2, 0x101]}, 0x5c) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="00ff07000000000000a64aede41cd21b451d660029fcf194c8e05db0d6fd9fae9c525c"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 1668.704382][ T8279] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1668.727650][ T8279] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1668.782420][ T8279] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1668.829394][ T8279] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:08:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf00512cb9c97b64226b7cda8bd329636d6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x400}], 0x3f000000, 0x0) 22:08:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@assoc={0x18, 0x117, 0x4, 0x6}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x4}, 0x0) 22:08:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x4, 0x378, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000840)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff010000001b00000000000000000076657468305f746f5f62726964676500766574683000000000000000000000007663616e3000000000000000000000006272696467655f736c6176655f310000ffffffffffff000000000000aaaaaaaaaabb000000000000000070000000a0000000d000000072656469726563740000000000000000000000000000000000000000000000000800000000000000fcffffff00000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0200000003000000000000000000627269646765300000000000000000007665746830000000000000000000000076657468315f746f5f627269646765006e723000000000000000000000000000aaaaaaaaaa0000000000000000000000000000000000000000007000000070000000a00000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000001700000000000000000076657468315f746f5f6272696467650065716c00000000000000000000000000626f6e645f736c6176655f30000000007465716c300000000000000000000000000000000000000000000000aaaaaaaaaa0000000000000000007000000070000000c00000004c45440000000000000000000000000000000000000000000000000000000000280000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000ffffffb7f53e507d79532db941ef53ff0100000005000000000000000000726f7365300000000000000000000000626f6e645f736c6176655f310000000076657468315f746f5f7465616d00000069706464703000000000000000000000000000000000000000000000ffffffffffff00000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3000000000000000000000000000000000000000000000000000000000cb9adafd5229fef9ef37976d2d4dbe34ce94"]}, 0x40e) 22:08:11 executing program 5: openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x234, 0x0) [ 1669.154916][ T8557] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1669.172155][ T8558] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode 22:08:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x1c) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'netdevsim0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f00000000c0)={'team0\x00', r4}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000180)={0x7b, 0x0, [0x40000022], [0x187]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 1669.212757][ T8558] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1669.222734][ C0] net_ratelimit: 22 callbacks suppressed [ 1669.222742][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1669.234543][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1669.313977][ T8558] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1669.336979][ T8558] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) 22:08:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="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", 0x101, 0x400}], 0x40000000, 0x0) 22:08:11 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x400200220200, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, &(0x7f0000000380)) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x0, 0xa02000}, 0xc) socket$inet(0x2, 0x80806, 0xfffffffffffffff8) r2 = socket$inet6(0xa, 0x7, 0x2) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, 0x0, &(0x7f0000000240)) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e20, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000480)={{{@in=@loopback, @in6=@local}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0x5a) getresgid(&(0x7f0000000280), 0x0, &(0x7f00000005c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000600)) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000900)={{{@in=@broadcast, @in6=@dev}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000880)=0xe8) getresuid(&(0x7f0000000300), 0x0, &(0x7f0000000340)) write$FUSE_POLL(r1, &(0x7f0000000180)={0x18, 0x0, 0x4, {0x80000001}}, 0x18) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000680)={r3, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x84) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000ec0)={{{@in=@multicast2, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000fc0)=0xe8) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, 0x0) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r6, r5, &(0x7f000000b000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r1, 0x101, 0x4, &(0x7f0000000000), &(0x7f0000000400)=0x4) [ 1669.512570][ T8688] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 1669.526310][ T8691] [ 1669.528653][ T8691] ===================================== [ 1669.531893][ T8688] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (d2e00000) [ 1669.534180][ T8691] WARNING: bad unlock balance detected! [ 1669.534189][ T8691] 5.0.0-rc6-next-20190215 #36 Not tainted [ 1669.534193][ T8691] ------------------------------------- [ 1669.534200][ T8691] syz-executor.3/8691 is trying to release lock (&file->mut) at: [ 1669.534314][ T8691] [] ucma_destroy_id+0x24c/0x4a0 [ 1669.534318][ T8691] but there are no more locks to release! [ 1669.534322][ T8691] [ 1669.534322][ T8691] other info that might help us debug this: [ 1669.534329][ T8691] 1 lock held by syz-executor.3/8691: [ 1669.534333][ T8691] #0: 00000000414ece80 (&file->mut){+.+.}, at: ucma_destroy_id+0x1e9/0x4a0 [ 1669.602577][ T8691] [ 1669.602577][ T8691] stack backtrace: [ 1669.608471][ T8691] CPU: 1 PID: 8691 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1669.617477][ T8691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1669.627521][ T8691] Call Trace: [ 1669.630807][ T8691] dump_stack+0x172/0x1f0 [ 1669.635141][ T8691] ? ucma_destroy_id+0x24c/0x4a0 [ 1669.640073][ T8691] print_unlock_imbalance_bug.cold+0x114/0x123 [ 1669.646208][ T8691] ? ucma_destroy_id+0x24c/0x4a0 [ 1669.651121][ T8691] lock_release+0x67e/0xa00 [ 1669.655604][ T8691] ? lock_downgrade+0x880/0x880 [ 1669.660435][ T8691] ? mutex_trylock+0x1e0/0x1e0 [ 1669.665177][ T8691] __mutex_unlock_slowpath+0x8e/0x6b0 [ 1669.670538][ T8691] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1669.676753][ T8691] ? wait_for_completion+0x440/0x440 [ 1669.682025][ T8691] mutex_unlock+0xd/0x10 [ 1669.686244][ T8691] ucma_destroy_id+0x24c/0x4a0 [ 1669.690989][ T8691] ? ucma_close+0x320/0x320 [ 1669.695475][ T8691] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1669.701697][ T8691] ? _copy_from_user+0xdd/0x150 [ 1669.706524][ T8691] ucma_write+0x2da/0x3c0 [ 1669.710834][ T8691] ? ucma_close+0x320/0x320 [ 1669.715313][ T8691] ? ucma_open+0x290/0x290 [ 1669.719708][ T8691] ? apparmor_file_permission+0x25/0x30 [ 1669.725230][ T8691] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1669.731450][ T8691] ? security_file_permission+0x94/0x380 [ 1669.737065][ T8691] __vfs_write+0x8d/0x110 [ 1669.741381][ T8691] ? ucma_open+0x290/0x290 [ 1669.745776][ T8691] vfs_write+0x20c/0x580 [ 1669.750018][ T8691] ksys_write+0xea/0x1f0 [ 1669.754349][ T8691] ? __ia32_sys_read+0xb0/0xb0 [ 1669.759097][ T8691] ? do_syscall_64+0x26/0x610 [ 1669.763756][ T8691] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1669.769798][ T8691] ? do_syscall_64+0x26/0x610 [ 1669.774453][ T8691] __x64_sys_write+0x73/0xb0 [ 1669.779020][ T8691] do_syscall_64+0x103/0x610 [ 1669.783590][ T8691] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1669.789458][ T8691] RIP: 0033:0x457e29 [ 1669.793334][ T8691] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1669.812919][ T8691] RSP: 002b:00007f3503ba7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1669.821303][ T8691] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e29 [ 1669.829252][ T8691] RDX: 0000000000000018 RSI: 0000000020000280 RDI: 000000000000000a [ 1669.837202][ T8691] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1669.845153][ T8691] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3503ba86d4 [ 1669.853100][ T8691] R13: 00000000004cd790 R14: 00000000004dc9d0 R15: 00000000ffffffff [ 1669.862706][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1669.862711][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1669.862743][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1669.868516][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1669.874205][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1669.891323][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1669.897319][ T8691] ================================================================== [ 1669.905409][ T8691] BUG: KASAN: use-after-free in __mutex_unlock_slowpath+0x9b/0x6b0 [ 1669.913294][ T8691] Read of size 8 at addr ffff88800fd818c0 by task syz-executor.3/8691 [ 1669.921424][ T8691] [ 1669.923756][ T8691] CPU: 0 PID: 8691 Comm: syz-executor.3 Not tainted 5.0.0-rc6-next-20190215 #36 [ 1669.932765][ T8691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1669.942811][ T8691] Call Trace: [ 1669.946101][ T8691] dump_stack+0x172/0x1f0 [ 1669.950426][ T8691] ? __mutex_unlock_slowpath+0x9b/0x6b0 [ 1669.955965][ T8691] print_address_description.cold+0x7c/0x20d [ 1669.961937][ T8691] ? __mutex_unlock_slowpath+0x9b/0x6b0 [ 1669.967474][ T8691] ? __mutex_unlock_slowpath+0x9b/0x6b0 [ 1669.973011][ T8691] kasan_report.cold+0x1b/0x40 [ 1669.977769][ T8691] ? __mutex_unlock_slowpath+0x9b/0x6b0 [ 1669.983409][ T8691] check_memory_region+0x123/0x190 [ 1669.988516][ T8691] kasan_check_read+0x11/0x20 [ 1669.993190][ T8691] __mutex_unlock_slowpath+0x9b/0x6b0 [ 1669.998554][ T8691] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1670.004791][ T8691] ? wait_for_completion+0x440/0x440 [ 1670.010076][ T8691] mutex_unlock+0xd/0x10 22:08:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000500)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x258) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x258}, 0x0) 22:08:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x1, &(0x7f0000000780)=[{&(0x7f0000000040)="800300000002010019000000e60100006c000000000000040004000001000000004000000040000080000000000000006d5ebe5a0000140053efcb0c4baf3cf00512cb9c97b64226b7cda8bd329636d6522dd47ee4fc2a9cbbb715eb27d65b03d2c5e1d29d2008ca966b90ec19131e8391b974f22a85744f00f6143fc65079023520cd4bc221c0e8acf530043649170ca507c8b075aaf592ac7a269ce183f203491629e8e1e2ce86181f7f2a69a7cf6eeeea0e404da1380d5b1be8cd380ce2e6944071e9a31ca10009907e8fd938c68b12d295b218301f3efcc2b2461fc1a4788e56c29d2e238237ec2fa56be79f6d9aa4f0a0f21fdabc40a49acebecac86f613e", 0x101, 0x400}], 0x48000000, 0x0) [ 1670.014336][ T8691] ucma_destroy_id+0x24c/0x4a0 [ 1670.019105][ T8691] ? ucma_close+0x320/0x320 [ 1670.023622][ T8691] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1670.029864][ T8691] ? _copy_from_user+0xdd/0x150 [ 1670.034715][ T8691] ucma_write+0x2da/0x3c0 [ 1670.039037][ T8691] ? ucma_close+0x320/0x320 [ 1670.043530][ T8691] ? ucma_open+0x290/0x290 [ 1670.047929][ T8691] ? apparmor_file_permission+0x25/0x30 [ 1670.053451][ T8691] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1670.059672][ T8691] ? security_file_permission+0x94/0x380 [ 1670.065280][ T8691] __vfs_write+0x8d/0x110 [ 1670.069587][ T8691] ? ucma_open+0x290/0x290 [ 1670.073983][ T8691] vfs_write+0x20c/0x580 [ 1670.078215][ T8691] ksys_write+0xea/0x1f0 [ 1670.082440][ T8691] ? __ia32_sys_read+0xb0/0xb0 [ 1670.087197][ T8691] ? do_syscall_64+0x26/0x610 [ 1670.091863][ T8691] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1670.097902][ T8691] ? do_syscall_64+0x26/0x610 [ 1670.102554][ T8691] __x64_sys_write+0x73/0xb0 [ 1670.107139][ T8691] do_syscall_64+0x103/0x610 [ 1670.111716][ T8691] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1670.117578][ T8691] RIP: 0033:0x457e29 [ 1670.121453][ T8691] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1670.141032][ T8691] RSP: 002b:00007f3503ba7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1670.149416][ T8691] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e29 [ 1670.157362][ T8691] RDX: 0000000000000018 RSI: 0000000020000280 RDI: 000000000000000a [ 1670.165308][ T8691] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1670.173260][ T8691] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3503ba86d4 [ 1670.181207][ T8691] R13: 00000000004cd790 R14: 00000000004dc9d0 R15: 00000000ffffffff [ 1670.189153][ T8691] [ 1670.191465][ T8691] Allocated by task 8691: [ 1670.195771][ T8691] save_stack+0x45/0xd0 [ 1670.199902][ T8691] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1670.205508][ T8691] kasan_kmalloc+0x9/0x10 [ 1670.209810][ T8691] kmem_cache_alloc_trace+0x151/0x760 [ 1670.215158][ T8691] ucma_open+0x4f/0x290 [ 1670.219368][ T8691] misc_open+0x398/0x4c0 [ 1670.223588][ T8691] chrdev_open+0x247/0x6b0 [ 1670.227986][ T8691] do_dentry_open+0x488/0x1160 [ 1670.232724][ T8691] vfs_open+0xa0/0xd0 [ 1670.236689][ T8691] path_openat+0x10e9/0x46e0 [ 1670.241264][ T8691] do_filp_open+0x1a1/0x280 [ 1670.245759][ T8691] do_sys_open+0x3fe/0x5d0 [ 1670.250170][ T8691] __x64_sys_openat+0x9d/0x100 [ 1670.254911][ T8691] do_syscall_64+0x103/0x610 [ 1670.259482][ T8691] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1670.265343][ T8691] [ 1670.267650][ T8691] Freed by task 8231: [ 1670.271606][ T8691] save_stack+0x45/0xd0 [ 1670.275734][ T8691] __kasan_slab_free+0x102/0x150 [ 1670.280645][ T8691] kasan_slab_free+0xe/0x10 [ 1670.285134][ T8691] kfree+0xcf/0x230 [ 1670.288917][ T8691] ucma_close+0x291/0x320 [ 1670.293217][ T8691] __fput+0x2e5/0x8d0 [ 1670.297191][ T8691] ____fput+0x16/0x20 [ 1670.301208][ T8691] task_work_run+0x14a/0x1c0 [ 1670.305774][ T8691] exit_to_usermode_loop+0x273/0x2c0 [ 1670.311034][ T8691] do_syscall_64+0x52d/0x610 [ 1670.315602][ T8691] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1670.321471][ T8691] [ 1670.323780][ T8691] The buggy address belongs to the object at ffff88800fd818c0 [ 1670.323780][ T8691] which belongs to the cache kmalloc-256 of size 256 [ 1670.337801][ T8691] The buggy address is located 0 bytes inside of [ 1670.337801][ T8691] 256-byte region [ffff88800fd818c0, ffff88800fd819c0) [ 1670.350863][ T8691] The buggy address belongs to the page: [ 1670.356503][ T8691] page:ffffea00003f6040 count:1 mapcount:0 mapping:ffff88812c3f07c0 index:0xffff88800fd81280 [ 1670.366624][ T8691] flags: 0x1fffc0000000200(slab) [ 1670.371541][ T8691] raw: 01fffc0000000200 ffffea0000bd3c08 ffffea00024c9f08 ffff88812c3f07c0 [ 1670.380096][ T8691] raw: ffff88800fd81280 ffff88800fd81000 0000000100000005 0000000000000000 [ 1670.388645][ T8691] page dumped because: kasan: bad access detected [ 1670.395027][ T8691] [ 1670.397335][ T8691] Memory state around the buggy address: [ 1670.402941][ T8691] ffff88800fd81780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1670.410975][ T8691] ffff88800fd81800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1670.419007][ T8691] >ffff88800fd81880: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 1670.427045][ T8691] ^ [ 1670.433169][ T8691] ffff88800fd81900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1670.441203][ T8691] ffff88800fd81980: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1670.449233][ T8691] ================================================================== 22:08:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x400200220200, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, &(0x7f0000000380)) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x0, 0xa02000}, 0xc) socket$inet(0x2, 0x80806, 0xfffffffffffffff8) r2 = socket$inet6(0xa, 0x7, 0x2) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, 0x0, &(0x7f0000000240)) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e20, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000480)={{{@in=@loopback, @in6=@local}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0x5a) getresgid(&(0x7f0000000280), 0x0, &(0x7f00000005c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000600)) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000900)={{{@in=@broadcast, @in6=@dev}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000880)=0xe8) getresuid(&(0x7f0000000300), 0x0, &(0x7f0000000340)) write$FUSE_POLL(r1, &(0x7f0000000180)={0x18, 0x0, 0x4, {0x80000001}}, 0x18) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000680)={r3, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x84) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000ec0)={{{@in=@multicast2, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000fc0)=0xe8) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, 0x0) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r6, r5, &(0x7f000000b000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r1, 0x101, 0x4, &(0x7f0000000000), &(0x7f0000000400)=0x4) [ 1670.463169][ T8691] Kernel panic - not syncing: panic_on_warn set ... [ 1670.469770][ T8691] CPU: 0 PID: 8691 Comm: syz-executor.3 Tainted: G B 5.0.0-rc6-next-20190215 #36 [ 1670.480166][ T8691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1670.490213][ T8691] Call Trace: [ 1670.493499][ T8691] dump_stack+0x172/0x1f0 [ 1670.497840][ T8691] panic+0x2cb/0x65c [ 1670.501739][ T8691] ? __warn_printk+0xf3/0xf3 [ 1670.506335][ T8691] ? __mutex_unlock_slowpath+0x9b/0x6b0 [ 1670.511895][ T8691] ? preempt_schedule+0x4b/0x60 [ 1670.516736][ T8691] ? ___preempt_schedule+0x16/0x18 [ 1670.521823][ T8691] ? trace_hardirqs_on+0x5e/0x230 [ 1670.526821][ T8691] ? __mutex_unlock_slowpath+0x9b/0x6b0 [ 1670.532341][ T8691] end_report+0x47/0x4f [ 1670.536470][ T8691] ? __mutex_unlock_slowpath+0x9b/0x6b0 [ 1670.541986][ T8691] kasan_report.cold+0xe/0x40 [ 1670.546644][ T8691] ? __mutex_unlock_slowpath+0x9b/0x6b0 [ 1670.552167][ T8691] check_memory_region+0x123/0x190 [ 1670.557254][ T8691] kasan_check_read+0x11/0x20 [ 1670.561904][ T8691] __mutex_unlock_slowpath+0x9b/0x6b0 [ 1670.567257][ T8691] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1670.573485][ T8691] ? wait_for_completion+0x440/0x440 [ 1670.578754][ T8691] mutex_unlock+0xd/0x10 [ 1670.582974][ T8691] ucma_destroy_id+0x24c/0x4a0 [ 1670.587713][ T8691] ? ucma_close+0x320/0x320 [ 1670.592202][ T8691] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1670.598417][ T8691] ? _copy_from_user+0xdd/0x150 [ 1670.603260][ T8691] ucma_write+0x2da/0x3c0 [ 1670.607569][ T8691] ? ucma_close+0x320/0x320 [ 1670.612060][ T8691] ? ucma_open+0x290/0x290 [ 1670.616453][ T8691] ? apparmor_file_permission+0x25/0x30 [ 1670.621971][ T8691] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1670.628186][ T8691] ? security_file_permission+0x94/0x380 [ 1670.633796][ T8691] __vfs_write+0x8d/0x110 [ 1670.638102][ T8691] ? ucma_open+0x290/0x290 [ 1670.642502][ T8691] vfs_write+0x20c/0x580 [ 1670.646721][ T8691] ksys_write+0xea/0x1f0 [ 1670.650940][ T8691] ? __ia32_sys_read+0xb0/0xb0 [ 1670.655680][ T8691] ? do_syscall_64+0x26/0x610 [ 1670.660330][ T8691] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1670.666371][ T8691] ? do_syscall_64+0x26/0x610 [ 1670.671025][ T8691] __x64_sys_write+0x73/0xb0 [ 1670.675588][ T8691] do_syscall_64+0x103/0x610 [ 1670.680166][ T8691] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1670.686037][ T8691] RIP: 0033:0x457e29 [ 1670.689926][ T8691] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1670.709517][ T8691] RSP: 002b:00007f3503ba7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1670.717903][ T8691] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e29 [ 1670.725852][ T8691] RDX: 0000000000000018 RSI: 0000000020000280 RDI: 000000000000000a [ 1670.733796][ T8691] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1670.741741][ T8691] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3503ba86d4 [ 1670.749687][ T8691] R13: 00000000004cd790 R14: 00000000004dc9d0 R15: 00000000ffffffff [ 1670.758784][ T8691] Kernel Offset: disabled [ 1670.763097][ T8691] Rebooting in 86400 seconds..