x00', 0x1ff) 18:20:43 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1fb, 0x0) 18:20:43 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x21f, 0x0) 18:20:43 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a1, 0x0) 18:20:43 executing program 4 (fault-call:0 fault-nth:26): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:20:43 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1c1, 0x0) [ 1068.754555][T29146] FAULT_INJECTION: forcing a failure. [ 1068.754555][T29146] name failslab, interval 1, probability 0, space 0, times 0 [ 1068.768904][T29146] CPU: 0 PID: 29146 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1068.776825][T29146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1068.786890][T29146] Call Trace: [ 1068.790193][T29146] dump_stack+0x197/0x210 [ 1068.794647][T29146] should_fail.cold+0xa/0x15 [ 1068.799260][T29146] ? fault_create_debugfs_attr+0x180/0x180 [ 1068.805080][T29146] ? ___might_sleep+0x163/0x2c0 [ 1068.809945][T29146] __should_failslab+0x121/0x190 [ 1068.814911][T29146] should_failslab+0x9/0x14 [ 1068.819420][T29146] kmem_cache_alloc_node+0x268/0x740 [ 1068.824726][T29146] ? find_held_lock+0x35/0x130 [ 1068.829602][T29146] ? netlink_has_listeners+0x23b/0x3f0 [ 1068.835126][T29146] __alloc_skb+0xd5/0x5e0 [ 1068.839478][T29146] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1068.845033][T29146] ? __kasan_check_read+0x11/0x20 [ 1068.850071][T29146] alloc_uevent_skb+0x83/0x1e2 [ 1068.854854][T29146] kobject_uevent_env+0xaa3/0x1023 [ 1068.859981][T29146] kobject_uevent+0x20/0x26 [ 1068.864491][T29146] loop_set_fd+0xdec/0x13c0 [ 1068.869184][T29146] lo_ioctl+0x1a3/0x1460 [ 1068.873438][T29146] ? loop_set_fd+0x13c0/0x13c0 [ 1068.878214][T29146] blkdev_ioctl+0xedb/0x1c20 [ 1068.882811][T29146] ? blkpg_ioctl+0xa90/0xa90 [ 1068.887419][T29146] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1068.893252][T29146] block_ioctl+0xee/0x130 [ 1068.897588][T29146] ? blkdev_fallocate+0x410/0x410 [ 1068.902647][T29146] do_vfs_ioctl+0xdb6/0x13e0 [ 1068.907253][T29146] ? ioctl_preallocate+0x210/0x210 [ 1068.912366][T29146] ? __fget+0x384/0x560 [ 1068.917141][T29146] ? ksys_dup3+0x3e0/0x3e0 [ 1068.921563][T29146] ? do_sys_open+0x31d/0x5d0 [ 1068.926160][T29146] ? tomoyo_file_ioctl+0x23/0x30 [ 1068.931102][T29146] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1068.937349][T29146] ? security_file_ioctl+0x8d/0xc0 [ 1068.942487][T29146] ksys_ioctl+0xab/0xd0 [ 1068.946657][T29146] __x64_sys_ioctl+0x73/0xb0 [ 1068.951253][T29146] do_syscall_64+0xfa/0x760 [ 1068.955768][T29146] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1068.961664][T29146] RIP: 0033:0x45a4a7 [ 1068.965572][T29146] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1068.985272][T29146] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1068.993697][T29146] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 000000000045a4a7 18:20:44 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x220, 0x0) [ 1069.001676][T29146] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1069.009742][T29146] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1069.018673][T29146] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1069.027015][T29146] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:20:44 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1c2, 0x0) 18:20:44 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a2, 0x0) [ 1069.070456][T29146] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:20:44 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1fc, 0x0) 18:20:44 executing program 4 (fault-call:0 fault-nth:27): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:20:44 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a3, 0x0) [ 1069.586264][T29172] FAULT_INJECTION: forcing a failure. [ 1069.586264][T29172] name failslab, interval 1, probability 0, space 0, times 0 18:20:44 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1c3, 0x0) [ 1069.666508][T29172] CPU: 0 PID: 29172 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1069.674583][T29172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1069.684645][T29172] Call Trace: [ 1069.687964][T29172] dump_stack+0x197/0x210 [ 1069.692321][T29172] should_fail.cold+0xa/0x15 [ 1069.696932][T29172] ? fault_create_debugfs_attr+0x180/0x180 [ 1069.702763][T29172] ? ___might_sleep+0x163/0x2c0 [ 1069.707636][T29172] __should_failslab+0x121/0x190 [ 1069.712590][T29172] should_failslab+0x9/0x14 [ 1069.717240][T29172] kmem_cache_alloc_node+0x268/0x740 [ 1069.722564][T29172] ? find_held_lock+0x35/0x130 [ 1069.727338][T29172] ? netlink_has_listeners+0x23b/0x3f0 [ 1069.732811][T29172] __alloc_skb+0xd5/0x5e0 [ 1069.737159][T29172] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1069.742720][T29172] ? __kasan_check_read+0x11/0x20 [ 1069.747764][T29172] alloc_uevent_skb+0x83/0x1e2 [ 1069.752537][T29172] kobject_uevent_env+0xaa3/0x1023 [ 1069.757665][T29172] kobject_uevent+0x20/0x26 [ 1069.762265][T29172] loop_set_fd+0xdec/0x13c0 [ 1069.766787][T29172] lo_ioctl+0x1a3/0x1460 [ 1069.771026][T29172] ? loop_set_fd+0x13c0/0x13c0 [ 1069.775824][T29172] blkdev_ioctl+0xedb/0x1c20 [ 1069.780600][T29172] ? blkpg_ioctl+0xa90/0xa90 [ 1069.785559][T29172] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1069.791367][T29172] block_ioctl+0xee/0x130 [ 1069.795693][T29172] ? blkdev_fallocate+0x410/0x410 [ 1069.800864][T29172] do_vfs_ioctl+0xdb6/0x13e0 [ 1069.805461][T29172] ? ioctl_preallocate+0x210/0x210 [ 1069.810707][T29172] ? __fget+0x384/0x560 [ 1069.814858][T29172] ? ksys_dup3+0x3e0/0x3e0 [ 1069.819521][T29172] ? do_sys_open+0x31d/0x5d0 [ 1069.824095][T29172] ? tomoyo_file_ioctl+0x23/0x30 [ 1069.830926][T29172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1069.837155][T29172] ? security_file_ioctl+0x8d/0xc0 [ 1069.842247][T29172] ksys_ioctl+0xab/0xd0 [ 1069.846401][T29172] __x64_sys_ioctl+0x73/0xb0 [ 1069.850992][T29172] do_syscall_64+0xfa/0x760 [ 1069.855495][T29172] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1069.861568][T29172] RIP: 0033:0x45a4a7 [ 1069.865456][T29172] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1069.885075][T29172] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1069.893504][T29172] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 000000000045a4a7 [ 1069.901490][T29172] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1069.909457][T29172] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1069.917431][T29172] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1069.925405][T29172] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 [ 1069.961733][T29172] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:20:50 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a4, 0x0) 18:20:50 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x221, 0x0) 18:20:50 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1fd, 0x0) 18:20:50 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1c4, 0x0) 18:20:50 executing program 2: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000580)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000043fe0000070600000ee60000bf050000000000001f650000000000006507000002000000270700004c0000001f75000000000000bf5420c271b896a74062f0b76f000000000000070400000400f9ffad4301000000000095000000000000000500000000dbbea6d23c4dd03c97e5c05e167ef0597dbc2a12b4"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc05c6104, &(0x7f0000000000)) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f00000001c0)={0x2, &(0x7f0000000080), 0x5, 0xffffffffffffffff, 0x2}) r1 = syz_open_dev$vcsn(0x0, 0x0, 0x400000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x0, 0x56, 0x0, &(0x7f0000000140)="fc4bbaa33d4fcdcfdcd447a154f27758c18a882b88410d2796870d194d4ea3cddd1b6f62da56e217760d0491f49f6b97f1eff61a4135c6af082fa1a8c29bdc0bafd6337cd46eb7ba6bae0cf287c5a97831fd193881ce", 0x0, 0x7, 0x0, 0x73, 0xed, &(0x7f0000000380)="057cf41c966e06bd8db8140a393f43db7eb390e0dd4cc4b56c7c9237ac02adbc2e561f7d1f99816417c19217bf58fbf44c874214d07751402222f557ea7bdd75944beb9c65e5d8c353eb1ca6462a2c750f9e815a9ce52443b9080058f70e560cdc5ecee32d3f6358f69e71fb95cc3aa7df3769", &(0x7f0000000480)="d025930ab0cfea76245178ebf009f593d14cbfd1afc021e6ba0d435ed134ac46730a10293f9c187aff67f95b76d3b36bcfec6209c52789370ec2be90c65d13aa6a79bceb22d64283a38155b0c429f959fc9cc392d44ff695143f291a58b4219f4bf6cc88a979f1ad1f6e9b9cb3451d6420ac7ca05b52c0a96141b57352b340a5c4e351be3c09271971207c0c3335cbe613508844936969c09440fb6e67157315f786adf4777f15f76a4267cf4c8aec7bb16d77a274c30f1bfa74a055b0b4f2b5150cbd4f3fe375cc8bfee3134f953c277c08e872de278acc23c466bfce70e4b4d371957c409f4fdf3475762a32"}, 0x40) exit(0x0) 18:20:50 executing program 4 (fault-call:0 fault-nth:28): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1075.937694][T29200] FAULT_INJECTION: forcing a failure. [ 1075.937694][T29200] name failslab, interval 1, probability 0, space 0, times 0 [ 1076.004661][T29200] CPU: 1 PID: 29200 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1076.012610][T29200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1076.022667][T29200] Call Trace: [ 1076.028395][T29200] dump_stack+0x197/0x210 [ 1076.032739][T29200] should_fail.cold+0xa/0x15 [ 1076.037943][T29200] ? fault_create_debugfs_attr+0x180/0x180 [ 1076.043753][T29200] ? ___might_sleep+0x163/0x2c0 [ 1076.048611][T29200] __should_failslab+0x121/0x190 [ 1076.053693][T29200] should_failslab+0x9/0x14 [ 1076.058196][T29200] kmem_cache_alloc_node+0x268/0x740 [ 1076.063525][T29200] ? find_held_lock+0x35/0x130 [ 1076.069177][T29200] ? netlink_has_listeners+0x23b/0x3f0 [ 1076.074644][T29200] __alloc_skb+0xd5/0x5e0 [ 1076.078979][T29200] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1076.084619][T29200] ? __kasan_check_read+0x11/0x20 [ 1076.089653][T29200] alloc_uevent_skb+0x83/0x1e2 [ 1076.094422][T29200] kobject_uevent_env+0xaa3/0x1023 [ 1076.099546][T29200] kobject_uevent+0x20/0x26 [ 1076.104060][T29200] loop_set_fd+0xdec/0x13c0 [ 1076.108571][T29200] lo_ioctl+0x1a3/0x1460 [ 1076.112803][T29200] ? loop_set_fd+0x13c0/0x13c0 [ 1076.117564][T29200] blkdev_ioctl+0xedb/0x1c20 [ 1076.122142][T29200] ? blkpg_ioctl+0xa90/0xa90 [ 1076.126717][T29200] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1076.132522][T29200] block_ioctl+0xee/0x130 [ 1076.136837][T29200] ? blkdev_fallocate+0x410/0x410 [ 1076.141859][T29200] do_vfs_ioctl+0xdb6/0x13e0 [ 1076.146433][T29200] ? ioctl_preallocate+0x210/0x210 [ 1076.151530][T29200] ? __fget+0x384/0x560 [ 1076.155674][T29200] ? ksys_dup3+0x3e0/0x3e0 [ 1076.160073][T29200] ? do_sys_open+0x31d/0x5d0 [ 1076.164654][T29200] ? tomoyo_file_ioctl+0x23/0x30 [ 1076.169681][T29200] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1076.175908][T29200] ? security_file_ioctl+0x8d/0xc0 [ 1076.181004][T29200] ksys_ioctl+0xab/0xd0 [ 1076.185148][T29200] __x64_sys_ioctl+0x73/0xb0 [ 1076.189727][T29200] do_syscall_64+0xfa/0x760 [ 1076.194219][T29200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1076.200202][T29200] RIP: 0033:0x45a4a7 [ 1076.204081][T29200] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1076.228627][T29200] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1076.237043][T29200] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 000000000045a4a7 [ 1076.245010][T29200] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 18:20:51 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1c5, 0x0) 18:20:51 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 18:20:51 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x222, 0x0) [ 1076.252967][T29200] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1076.260927][T29200] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1076.268881][T29200] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:20:51 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a5, 0x0) [ 1076.323033][T29200] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:20:51 executing program 4 (fault-call:0 fault-nth:29): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:20:51 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a6, 0x0) 18:20:51 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x223, 0x0) 18:20:51 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1c6, 0x0) 18:20:51 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x201, 0x0) 18:20:51 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a7, 0x0) [ 1076.816246][T29231] FAULT_INJECTION: forcing a failure. [ 1076.816246][T29231] name failslab, interval 1, probability 0, space 0, times 0 [ 1076.944665][T29231] CPU: 0 PID: 29231 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1076.952621][T29231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1076.962687][T29231] Call Trace: [ 1076.965991][T29231] dump_stack+0x197/0x210 [ 1076.970351][T29231] should_fail.cold+0xa/0x15 [ 1076.974963][T29231] ? fault_create_debugfs_attr+0x180/0x180 [ 1076.980789][T29231] ? ___might_sleep+0x163/0x2c0 [ 1076.985653][T29231] __should_failslab+0x121/0x190 [ 1076.990605][T29231] should_failslab+0x9/0x14 [ 1076.995117][T29231] kmem_cache_alloc+0x2aa/0x710 [ 1076.999971][T29231] ? debug_smp_processor_id+0x3c/0x214 [ 1077.005435][T29231] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1077.011597][T29231] getname_flags+0xd6/0x5b0 [ 1077.016107][T29231] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1077.021748][T29231] do_mkdirat+0xa0/0x2a0 [ 1077.026004][T29231] ? __ia32_sys_mknod+0xb0/0xb0 [ 1077.030856][T29231] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1077.036409][T29231] ? do_syscall_64+0x26/0x760 [ 1077.041175][T29231] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1077.047245][T29231] ? do_syscall_64+0x26/0x760 [ 1077.051930][T29231] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1077.057231][T29231] __x64_sys_mkdir+0x5c/0x80 [ 1077.061845][T29231] do_syscall_64+0xfa/0x760 [ 1077.066465][T29231] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1077.072358][T29231] RIP: 0033:0x459a57 [ 1077.076258][T29231] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1077.095872][T29231] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1077.104299][T29231] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 0000000000459a57 [ 1077.112372][T29231] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 1077.120462][T29231] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1077.128442][T29231] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1077.136420][T29231] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:21:00 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, @perf_config_ext={0x5, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2500000026000500d25a80648c63940d1000fc001000024002000000053582c137153e3709", 0x25}], 0x1}, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x100000000, 0x420000) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f0000000180)={0xf, 0x1, 0x81}) r2 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) 18:21:00 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x224, 0x0) 18:21:00 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1c7, 0x0) 18:21:00 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a8, 0x0) 18:21:00 executing program 4 (fault-call:0 fault-nth:30): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:21:00 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x202, 0x0) [ 1085.209777][T29273] FAULT_INJECTION: forcing a failure. [ 1085.209777][T29273] name failslab, interval 1, probability 0, space 0, times 0 [ 1085.238067][T29273] CPU: 1 PID: 29273 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1085.246017][T29273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1085.256086][T29273] Call Trace: [ 1085.259395][T29273] dump_stack+0x197/0x210 [ 1085.263744][T29273] should_fail.cold+0xa/0x15 [ 1085.268357][T29273] ? fault_create_debugfs_attr+0x180/0x180 [ 1085.274181][T29273] ? ___might_sleep+0x163/0x2c0 [ 1085.279046][T29273] __should_failslab+0x121/0x190 [ 1085.283998][T29273] should_failslab+0x9/0x14 [ 1085.288503][T29273] __kmalloc+0x2e0/0x770 [ 1085.292762][T29273] ? kobject_get_path+0xc4/0x1b0 [ 1085.297735][T29273] kobject_get_path+0xc4/0x1b0 [ 1085.302508][T29273] kobject_uevent_env+0x3ab/0x1023 [ 1085.307629][T29273] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1085.313890][T29273] kobject_uevent+0x20/0x26 [ 1085.318402][T29273] loop_set_fd+0xdec/0x13c0 [ 1085.322927][T29273] lo_ioctl+0x1a3/0x1460 [ 1085.327183][T29273] ? loop_set_fd+0x13c0/0x13c0 [ 1085.331966][T29273] blkdev_ioctl+0xedb/0x1c20 [ 1085.336801][T29273] ? blkpg_ioctl+0xa90/0xa90 [ 1085.343150][T29273] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1085.348986][T29273] block_ioctl+0xee/0x130 [ 1085.353328][T29273] ? blkdev_fallocate+0x410/0x410 [ 1085.358362][T29273] do_vfs_ioctl+0xdb6/0x13e0 [ 1085.362967][T29273] ? ioctl_preallocate+0x210/0x210 [ 1085.368092][T29273] ? __fget+0x384/0x560 [ 1085.372260][T29273] ? ksys_dup3+0x3e0/0x3e0 [ 1085.376703][T29273] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1085.382282][T29273] ? tomoyo_file_ioctl+0x23/0x30 [ 1085.388353][T29273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1085.394626][T29273] ? security_file_ioctl+0x8d/0xc0 [ 1085.399750][T29273] ksys_ioctl+0xab/0xd0 [ 1085.403915][T29273] __x64_sys_ioctl+0x73/0xb0 [ 1085.408645][T29273] do_syscall_64+0xfa/0x760 [ 1085.413156][T29273] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1085.419137][T29273] RIP: 0033:0x45a4a7 [ 1085.423064][T29273] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1085.442776][T29273] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1085.451201][T29273] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 000000000045a4a7 18:21:00 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a9, 0x0) 18:21:00 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x203, 0x0) [ 1085.459183][T29273] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1085.467165][T29273] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1085.475147][T29273] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1085.483147][T29273] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:21:00 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x225, 0x0) 18:21:00 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1c8, 0x0) [ 1085.544012][T29273] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:21:00 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2aa, 0x0) 18:21:00 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x226, 0x0) [ 1091.345855][T29314] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 18:21:07 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000400)) syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000500)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000540)={r2, r3+10000000}) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000240)=""/82) r4 = request_key(&(0x7f0000000300)='cifs.spnego\x00', 0x0, &(0x7f00000003c0)='\x00', 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, r4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000004c0)) setpriority(0x0, 0x0, 0x1) prctl$PR_GET_TIMERSLACK(0x1e) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) 18:21:07 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x204, 0x0) 18:21:07 executing program 4 (fault-call:0 fault-nth:31): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:21:07 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ab, 0x0) 18:21:07 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x227, 0x0) 18:21:07 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1c9, 0x0) [ 1092.425920][T29325] FAULT_INJECTION: forcing a failure. [ 1092.425920][T29325] name failslab, interval 1, probability 0, space 0, times 0 [ 1092.482041][T29325] CPU: 1 PID: 29325 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1092.489990][T29325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1092.500230][T29325] Call Trace: [ 1092.503531][T29325] dump_stack+0x197/0x210 [ 1092.507903][T29325] should_fail.cold+0xa/0x15 [ 1092.512514][T29325] ? fault_create_debugfs_attr+0x180/0x180 [ 1092.518363][T29325] ? ___might_sleep+0x163/0x2c0 [ 1092.523314][T29325] __should_failslab+0x121/0x190 [ 1092.528261][T29325] should_failslab+0x9/0x14 [ 1092.532775][T29325] kmem_cache_alloc_node+0x268/0x740 [ 1092.538068][T29325] ? find_held_lock+0x35/0x130 [ 1092.542843][T29325] ? netlink_has_listeners+0x23b/0x3f0 [ 1092.548314][T29325] __alloc_skb+0xd5/0x5e0 [ 1092.552656][T29325] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1092.558211][T29325] ? __kasan_check_read+0x11/0x20 [ 1092.563241][T29325] alloc_uevent_skb+0x83/0x1e2 [ 1092.568012][T29325] kobject_uevent_env+0xaa3/0x1023 [ 1092.573231][T29325] kobject_uevent+0x20/0x26 [ 1092.577756][T29325] loop_set_fd+0xdec/0x13c0 [ 1092.582279][T29325] lo_ioctl+0x1a3/0x1460 [ 1092.586536][T29325] ? loop_set_fd+0x13c0/0x13c0 [ 1092.591307][T29325] blkdev_ioctl+0xedb/0x1c20 [ 1092.595901][T29325] ? blkpg_ioctl+0xa90/0xa90 [ 1092.600496][T29325] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1092.606332][T29325] block_ioctl+0xee/0x130 [ 1092.610663][T29325] ? blkdev_fallocate+0x410/0x410 [ 1092.615707][T29325] do_vfs_ioctl+0xdb6/0x13e0 [ 1092.620309][T29325] ? ioctl_preallocate+0x210/0x210 [ 1092.625445][T29325] ? __fget+0x384/0x560 [ 1092.629607][T29325] ? ksys_dup3+0x3e0/0x3e0 [ 1092.634020][T29325] ? do_sys_open+0x31d/0x5d0 [ 1092.638663][T29325] ? tomoyo_file_ioctl+0x23/0x30 [ 1092.643603][T29325] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1092.649874][T29325] ? security_file_ioctl+0x8d/0xc0 [ 1092.654996][T29325] ksys_ioctl+0xab/0xd0 [ 1092.659187][T29325] __x64_sys_ioctl+0x73/0xb0 [ 1092.663794][T29325] do_syscall_64+0xfa/0x760 [ 1092.668311][T29325] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1092.674210][T29325] RIP: 0033:0x45a4a7 [ 1092.678126][T29325] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1092.697739][T29325] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1092.706165][T29325] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 000000000045a4a7 [ 1092.714245][T29325] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1092.722232][T29325] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 18:21:07 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1ca, 0x0) 18:21:07 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ac, 0x0) 18:21:07 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x228, 0x0) [ 1092.730223][T29325] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1092.738213][T29325] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 [ 1092.826771][T29325] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:21:07 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x205, 0x0) 18:21:07 executing program 4 (fault-call:0 fault-nth:32): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:21:08 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ad, 0x0) [ 1093.190631][T29355] FAULT_INJECTION: forcing a failure. [ 1093.190631][T29355] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1093.203978][T29355] CPU: 0 PID: 29355 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1093.211974][T29355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1093.222052][T29355] Call Trace: [ 1093.225363][T29355] dump_stack+0x197/0x210 [ 1093.229722][T29355] should_fail.cold+0xa/0x15 [ 1093.234336][T29355] ? fault_create_debugfs_attr+0x180/0x180 [ 1093.240277][T29355] ? __kasan_check_read+0x11/0x20 [ 1093.245313][T29355] ? __lock_acquire+0x16f2/0x4a00 [ 1093.250347][T29355] should_fail_alloc_page+0x50/0x60 [ 1093.255547][T29355] __alloc_pages_nodemask+0x1a1/0x900 [ 1093.260947][T29355] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1093.266589][T29355] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1093.272344][T29355] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1093.277998][T29355] ? fault_create_debugfs_attr+0x180/0x180 [ 1093.283824][T29355] cache_grow_begin+0x90/0xd20 [ 1093.288605][T29355] ? getname_flags+0xd6/0x5b0 [ 1093.293284][T29355] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1093.299534][T29355] kmem_cache_alloc+0x64e/0x710 [ 1093.304397][T29355] ? debug_smp_processor_id+0x3c/0x214 [ 1093.309882][T29355] getname_flags+0xd6/0x5b0 [ 1093.314575][T29355] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1093.320159][T29355] do_mkdirat+0xa0/0x2a0 [ 1093.324401][T29355] ? __ia32_sys_mknod+0xb0/0xb0 [ 1093.329285][T29355] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1093.334764][T29355] ? do_syscall_64+0x26/0x760 [ 1093.339470][T29355] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1093.345541][T29355] ? do_syscall_64+0x26/0x760 [ 1093.350579][T29355] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1093.355884][T29355] __x64_sys_mkdir+0x5c/0x80 [ 1093.360486][T29355] do_syscall_64+0xfa/0x760 [ 1093.364996][T29355] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1093.370926][T29355] RIP: 0033:0x459a57 [ 1093.375190][T29355] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1093.394821][T29355] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1093.404209][T29355] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 0000000000459a57 [ 1093.412202][T29355] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 1093.420175][T29355] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1093.428405][T29355] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1093.436485][T29355] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 [ 1093.451297][T29355] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:21:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r5, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x2, 0x0, 0x0, 0xe1) 18:21:14 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1cb, 0x0) 18:21:14 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x229, 0x0) 18:21:14 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ae, 0x0) 18:21:14 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x206, 0x0) 18:21:14 executing program 4 (fault-call:0 fault-nth:33): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1099.695210][T29377] FAULT_INJECTION: forcing a failure. [ 1099.695210][T29377] name failslab, interval 1, probability 0, space 0, times 0 [ 1099.758304][T29377] CPU: 1 PID: 29377 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1099.766255][T29377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1099.776318][T29377] Call Trace: [ 1099.779617][T29377] dump_stack+0x197/0x210 [ 1099.783992][T29377] should_fail.cold+0xa/0x15 [ 1099.788598][T29377] ? fault_create_debugfs_attr+0x180/0x180 [ 1099.794441][T29377] ? ___might_sleep+0x163/0x2c0 [ 1099.799326][T29377] __should_failslab+0x121/0x190 [ 1099.804274][T29377] should_failslab+0x9/0x14 [ 1099.808778][T29377] kmem_cache_alloc+0x2aa/0x710 [ 1099.813656][T29377] ? debug_smp_processor_id+0x3c/0x214 [ 1099.819140][T29377] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1099.825305][T29377] getname_flags+0xd6/0x5b0 [ 1099.829811][T29377] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1099.835366][T29377] do_mkdirat+0xa0/0x2a0 [ 1099.839611][T29377] ? __ia32_sys_mknod+0xb0/0xb0 [ 1099.844461][T29377] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1099.850012][T29377] ? do_syscall_64+0x26/0x760 [ 1099.854706][T29377] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1099.860784][T29377] ? do_syscall_64+0x26/0x760 [ 1099.865485][T29377] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1099.870797][T29377] __x64_sys_mkdir+0x5c/0x80 [ 1099.875389][T29377] do_syscall_64+0xfa/0x760 [ 1099.879901][T29377] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1099.885803][T29377] RIP: 0033:0x459a57 [ 1099.889702][T29377] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1099.909395][T29377] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1099.917822][T29377] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 0000000000459a57 [ 1099.926319][T29377] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 1099.934321][T29377] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1099.942306][T29377] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1099.950322][T29377] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:21:14 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2af, 0x0) 18:21:15 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1cc, 0x0) 18:21:15 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x22a, 0x0) 18:21:15 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x207, 0x0) 18:21:15 executing program 4 (fault-call:0 fault-nth:34): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:21:15 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b0, 0x0) [ 1100.545162][T29412] FAULT_INJECTION: forcing a failure. [ 1100.545162][T29412] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1100.558977][T29412] CPU: 0 PID: 29412 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1100.566881][T29412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1100.577035][T29412] Call Trace: [ 1100.580513][T29412] dump_stack+0x197/0x210 [ 1100.580557][T29412] should_fail.cold+0xa/0x15 [ 1100.589585][T29412] ? is_bpf_text_address+0xac/0x170 [ 1100.594794][T29412] ? fault_create_debugfs_attr+0x180/0x180 [ 1100.600725][T29412] ? is_bpf_text_address+0xac/0x170 [ 1100.605949][T29412] should_fail_alloc_page+0x50/0x60 [ 1100.611153][T29412] __alloc_pages_nodemask+0x1a1/0x900 [ 1100.616526][T29412] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1100.622774][T29412] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1100.629195][T29412] ? __kasan_check_read+0x11/0x20 [ 1100.634238][T29412] ? fault_create_debugfs_attr+0x180/0x180 [ 1100.640076][T29412] cache_grow_begin+0x90/0xd20 [ 1100.644849][T29412] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1100.650587][T29412] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1100.656841][T29412] __kmalloc+0x6b2/0x770 [ 1100.661096][T29412] ? mark_held_locks+0xf0/0xf0 [ 1100.665870][T29412] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1100.671595][T29412] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1100.677752][T29412] ? tomoyo_path_number_perm+0x193/0x520 [ 1100.683386][T29412] tomoyo_path_number_perm+0x1dd/0x520 [ 1100.688848][T29412] ? tomoyo_path_number_perm+0x193/0x520 [ 1100.694490][T29412] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1100.700305][T29412] ? find_held_lock+0x35/0x130 [ 1100.705093][T29412] ? putname+0xef/0x130 [ 1100.709271][T29412] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1100.714834][T29412] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1100.720831][T29412] ? trace_hardirqs_on+0x67/0x240 [ 1100.725864][T29412] ? kmem_cache_free+0x26b/0x320 [ 1100.730808][T29412] tomoyo_path_mkdir+0xaa/0xf0 [ 1100.735576][T29412] ? tomoyo_file_ioctl+0x30/0x30 [ 1100.740505][T29412] ? kern_path_mountpoint+0x40/0x40 [ 1100.745687][T29412] ? strncpy_from_user+0x2b4/0x400 [ 1100.750942][T29412] security_path_mkdir+0x113/0x170 [ 1100.756053][T29412] do_mkdirat+0x160/0x2a0 [ 1100.760485][T29412] ? __ia32_sys_mknod+0xb0/0xb0 [ 1100.765330][T29412] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1100.770781][T29412] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1100.776836][T29412] ? do_syscall_64+0x26/0x760 [ 1100.781507][T29412] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1100.786793][T29412] __x64_sys_mkdir+0x5c/0x80 [ 1100.791366][T29412] do_syscall_64+0xfa/0x760 [ 1100.795867][T29412] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1100.801746][T29412] RIP: 0033:0x459a57 [ 1100.805651][T29412] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1100.826857][T29412] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1100.835316][T29412] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 0000000000459a57 [ 1100.843299][T29412] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 1100.851269][T29412] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1100.859403][T29412] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1100.867360][T29412] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 [ 1100.880154][T29412] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:21:21 executing program 2: syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) 18:21:21 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x22b, 0x0) 18:21:21 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b1, 0x0) 18:21:21 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1cd, 0x0) 18:21:21 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x208, 0x0) 18:21:21 executing program 4 (fault-call:0 fault-nth:35): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1106.900917][T29433] FAULT_INJECTION: forcing a failure. [ 1106.900917][T29433] name failslab, interval 1, probability 0, space 0, times 0 [ 1106.959785][T29433] CPU: 1 PID: 29433 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1106.967754][T29433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1106.977818][T29433] Call Trace: [ 1106.981118][T29433] dump_stack+0x197/0x210 [ 1106.985462][T29433] should_fail.cold+0xa/0x15 [ 1106.990077][T29433] ? fault_create_debugfs_attr+0x180/0x180 [ 1106.995899][T29433] ? ___might_sleep+0x163/0x2c0 [ 1107.000764][T29433] __should_failslab+0x121/0x190 [ 1107.005710][T29433] should_failslab+0x9/0x14 [ 1107.010217][T29433] kmem_cache_alloc+0x2aa/0x710 [ 1107.015072][T29433] ? debug_smp_processor_id+0x3c/0x214 [ 1107.020538][T29433] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1107.026707][T29433] getname_flags+0xd6/0x5b0 [ 1107.031218][T29433] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1107.036777][T29433] do_mkdirat+0xa0/0x2a0 [ 1107.041025][T29433] ? __ia32_sys_mknod+0xb0/0xb0 [ 1107.046140][T29433] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1107.051609][T29433] ? do_syscall_64+0x26/0x760 18:21:22 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1ce, 0x0) [ 1107.056299][T29433] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1107.062364][T29433] ? do_syscall_64+0x26/0x760 [ 1107.062385][T29433] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1107.072437][T29433] __x64_sys_mkdir+0x5c/0x80 [ 1107.072453][T29433] do_syscall_64+0xfa/0x760 [ 1107.072473][T29433] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1107.087468][T29433] RIP: 0033:0x459a57 18:21:22 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b2, 0x0) [ 1107.091377][T29433] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1107.110994][T29433] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1107.119423][T29433] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 0000000000459a57 [ 1107.127405][T29433] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 1107.135385][T29433] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1107.143885][T29433] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1107.151893][T29433] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:21:22 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x22c, 0x0) 18:21:22 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b3, 0x0) 18:21:22 executing program 4 (fault-call:0 fault-nth:36): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1107.530870][T29461] FAULT_INJECTION: forcing a failure. [ 1107.530870][T29461] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1107.544125][T29461] CPU: 0 PID: 29461 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1107.552031][T29461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1107.562096][T29461] Call Trace: [ 1107.565399][T29461] dump_stack+0x197/0x210 [ 1107.569749][T29461] should_fail.cold+0xa/0x15 [ 1107.574359][T29461] ? is_bpf_text_address+0xac/0x170 [ 1107.579573][T29461] ? fault_create_debugfs_attr+0x180/0x180 [ 1107.585389][T29461] ? is_bpf_text_address+0xac/0x170 [ 1107.590607][T29461] should_fail_alloc_page+0x50/0x60 [ 1107.595817][T29461] __alloc_pages_nodemask+0x1a1/0x900 [ 1107.601195][T29461] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1107.607454][T29461] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1107.613179][T29461] ? __kasan_check_read+0x11/0x20 [ 1107.618223][T29461] ? fault_create_debugfs_attr+0x180/0x180 [ 1107.624075][T29461] cache_grow_begin+0x90/0xd20 18:21:22 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x22d, 0x0) [ 1107.628941][T29461] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1107.634670][T29461] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1107.640921][T29461] __kmalloc+0x6b2/0x770 [ 1107.645167][T29461] ? mark_held_locks+0xf0/0xf0 [ 1107.650236][T29461] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1107.655987][T29461] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1107.661560][T29461] ? tomoyo_path_number_perm+0x193/0x520 [ 1107.667198][T29461] tomoyo_path_number_perm+0x1dd/0x520 [ 1107.667209][T29461] ? tomoyo_path_number_perm+0x193/0x520 [ 1107.667225][T29461] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1107.667241][T29461] ? find_held_lock+0x35/0x130 [ 1107.667286][T29461] ? putname+0xef/0x130 [ 1107.667306][T29461] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1107.684165][T29461] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1107.684184][T29461] ? trace_hardirqs_on+0x67/0x240 [ 1107.684203][T29461] ? kmem_cache_free+0x26b/0x320 [ 1107.714613][T29461] tomoyo_path_mkdir+0xaa/0xf0 [ 1107.719385][T29461] ? tomoyo_file_ioctl+0x30/0x30 [ 1107.724331][T29461] ? kern_path_mountpoint+0x40/0x40 [ 1107.729549][T29461] ? strncpy_from_user+0x2b4/0x400 [ 1107.734670][T29461] security_path_mkdir+0x113/0x170 [ 1107.739792][T29461] do_mkdirat+0x160/0x2a0 [ 1107.744139][T29461] ? __ia32_sys_mknod+0xb0/0xb0 [ 1107.749112][T29461] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1107.754673][T29461] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1107.760746][T29461] ? do_syscall_64+0x26/0x760 [ 1107.765442][T29461] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1107.770741][T29461] __x64_sys_mkdir+0x5c/0x80 [ 1107.775346][T29461] do_syscall_64+0xfa/0x760 [ 1107.779863][T29461] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1107.786033][T29461] RIP: 0033:0x459a57 [ 1107.789936][T29461] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1107.809676][T29461] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1107.818190][T29461] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 0000000000459a57 [ 1107.826182][T29461] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 1107.834253][T29461] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1107.842257][T29461] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1107.850235][T29461] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 [ 1107.871433][T29461] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:21:31 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu\x00@z\x18Sb\xb0\xee\xb0< f\xb7\xc3\xfd0U\xedWM\xff\x7f\x88\xa2\xf4V~\x81U\xea\xfb\xcf\xef\xb3\xf8\xf2\xb5\x98\xe5\x93~z\xa3\x17\xb2\xb0#]Z\xe4$\x8b\xcb\xc5F\x92\x11\xf0\x1e-\x80\xb0\xef\x84\xe3[\x05\xb5\xb9\x9c\xa7@\x91\xbbq 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1116.423223][T29491] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1116.431728][T29491] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 0000000000459a57 [ 1116.439710][T29491] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 1116.447681][T29491] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1116.455653][T29491] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1116.463798][T29491] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:21:31 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b5, 0x0) 18:21:31 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) [ 1116.549743][T29491] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1116.578374][T29491] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:21:31 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x20a, 0x0) 18:21:31 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x22f, 0x0) 18:21:31 executing program 4 (fault-call:0 fault-nth:38): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:21:31 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1d1, 0x0) [ 1116.896521][T29520] FAULT_INJECTION: forcing a failure. [ 1116.896521][T29520] name failslab, interval 1, probability 0, space 0, times 0 [ 1116.909900][T29520] CPU: 0 PID: 29520 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1116.917816][T29520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1116.927881][T29520] Call Trace: [ 1116.931188][T29520] dump_stack+0x197/0x210 [ 1116.935536][T29520] should_fail.cold+0xa/0x15 [ 1116.940132][T29520] ? fault_create_debugfs_attr+0x180/0x180 [ 1116.945947][T29520] ? ___might_sleep+0x163/0x2c0 [ 1116.950808][T29520] __should_failslab+0x121/0x190 [ 1116.955750][T29520] ? ratelimit_state_init+0xb0/0xb0 [ 1116.960953][T29520] should_failslab+0x9/0x14 [ 1116.965455][T29520] kmem_cache_alloc+0x2aa/0x710 [ 1116.965499][T29520] ? ratelimit_state_init+0xb0/0xb0 [ 1116.965516][T29520] ext4_alloc_inode+0x1f/0x640 [ 1116.965532][T29520] ? ratelimit_state_init+0xb0/0xb0 [ 1116.965548][T29520] alloc_inode+0x68/0x1e0 [ 1116.965565][T29520] new_inode_pseudo+0x19/0xf0 [ 1116.965581][T29520] new_inode+0x1f/0x40 [ 1116.965594][T29520] __ext4_new_inode+0x3d5/0x4ee0 [ 1116.965618][T29520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1116.990245][T29520] ? __dquot_initialize+0x525/0xd80 [ 1116.990264][T29520] ? ext4_free_inode+0x1490/0x1490 [ 1116.990284][T29520] ? dqget+0x10d0/0x10d0 [ 1116.990307][T29520] ? putname+0xef/0x130 [ 1117.028953][T29520] ext4_mkdir+0x3df/0xe20 [ 1117.028983][T29520] ? ext4_init_dot_dotdot+0x520/0x520 [ 1117.028998][T29520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1117.029012][T29520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1117.029029][T29520] ? security_inode_permission+0xcb/0x100 [ 1117.029046][T29520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1117.063133][T29520] ? security_inode_mkdir+0xe4/0x120 [ 1117.068428][T29520] vfs_mkdir+0x42e/0x670 [ 1117.072709][T29520] do_mkdirat+0x234/0x2a0 [ 1117.077054][T29520] ? __ia32_sys_mknod+0xb0/0xb0 [ 1117.081937][T29520] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1117.087409][T29520] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1117.093488][T29520] ? do_syscall_64+0x26/0x760 [ 1117.098178][T29520] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1117.103474][T29520] __x64_sys_mkdir+0x5c/0x80 [ 1117.108192][T29520] do_syscall_64+0xfa/0x760 [ 1117.112715][T29520] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1117.118609][T29520] RIP: 0033:0x459a57 [ 1117.122508][T29520] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1117.142636][T29520] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1117.151071][T29520] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 0000000000459a57 [ 1117.159051][T29520] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 1117.167029][T29520] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1117.175033][T29520] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1117.183014][T29520] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:21:38 executing program 2: clone(0x3103101ff7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) munmap(&(0x7f00003e7000/0x2000)=nil, 0x2000) openat(0xffffffffffffff9c, 0x0, 0x101040, 0x122) 18:21:38 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b6, 0x0) 18:21:38 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x230, 0x0) 18:21:38 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x20b, 0x0) 18:21:38 executing program 4 (fault-call:0 fault-nth:39): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:21:38 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1d2, 0x0) [ 1123.407562][T29549] FAULT_INJECTION: forcing a failure. [ 1123.407562][T29549] name failslab, interval 1, probability 0, space 0, times 0 [ 1123.420871][T29549] CPU: 1 PID: 29549 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1123.428788][T29549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1123.438939][T29549] Call Trace: [ 1123.442350][T29549] dump_stack+0x197/0x210 [ 1123.446689][T29549] should_fail.cold+0xa/0x15 [ 1123.451283][T29549] ? fault_create_debugfs_attr+0x180/0x180 [ 1123.457134][T29549] __should_failslab+0x121/0x190 [ 1123.462076][T29549] should_failslab+0x9/0x14 [ 1123.466599][T29549] kmem_cache_alloc+0x47/0x710 [ 1123.471375][T29549] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1123.477098][T29549] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 1123.482561][T29549] ? do_raw_write_lock+0x124/0x290 [ 1123.487696][T29549] __es_insert_extent+0x2cc/0xf20 [ 1123.492737][T29549] ext4_es_insert_extent+0x2d2/0xa70 [ 1123.498035][T29549] ? ext4_es_scan_clu+0xe0/0xe0 [ 1123.502894][T29549] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1123.509160][T29549] ? ext4_es_lookup_extent+0x426/0xd40 [ 1123.514639][T29549] ext4_map_blocks+0x7ed/0x17e0 [ 1123.519507][T29549] ? ext4_issue_zeroout+0x190/0x190 [ 1123.524723][T29549] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1123.530798][T29549] ? __kasan_check_write+0x14/0x20 [ 1123.535919][T29549] ext4_getblk+0xc4/0x570 [ 1123.540326][T29549] ? ext4_iomap_begin+0x1000/0x1000 [ 1123.545544][T29549] ext4_bread+0x8f/0x390 [ 1123.549798][T29549] ? ext4_getblk+0x570/0x570 [ 1123.554929][T29549] ext4_append+0x155/0x370 [ 1123.559497][T29549] ext4_mkdir+0x632/0xe20 [ 1123.563844][T29549] ? ext4_init_dot_dotdot+0x520/0x520 [ 1123.569221][T29549] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1123.575484][T29549] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1123.581745][T29549] ? security_inode_permission+0xcb/0x100 [ 1123.587589][T29549] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1123.593848][T29549] ? security_inode_mkdir+0xe4/0x120 [ 1123.599138][T29549] vfs_mkdir+0x42e/0x670 [ 1123.603392][T29549] do_mkdirat+0x234/0x2a0 [ 1123.607734][T29549] ? __ia32_sys_mknod+0xb0/0xb0 [ 1123.612590][T29549] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1123.618050][T29549] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1123.624120][T29549] ? do_syscall_64+0x26/0x760 [ 1123.628801][T29549] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1123.634098][T29549] __x64_sys_mkdir+0x5c/0x80 [ 1123.638693][T29549] do_syscall_64+0xfa/0x760 [ 1123.643222][T29549] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1123.649545][T29549] RIP: 0033:0x459a57 [ 1123.653451][T29549] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1123.673071][T29549] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1123.681495][T29549] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 0000000000459a57 [ 1123.689496][T29549] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 1123.697474][T29549] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1123.707200][T29549] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1123.715176][T29549] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 [ 1123.747562][T29549] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:21:38 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x231, 0x0) 18:21:38 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x20c, 0x0) 18:21:38 executing program 4 (fault-call:0 fault-nth:40): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:21:38 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b7, 0x0) [ 1124.060413][T29566] FAULT_INJECTION: forcing a failure. [ 1124.060413][T29566] name failslab, interval 1, probability 0, space 0, times 0 [ 1124.143755][T29566] CPU: 0 PID: 29566 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1124.151711][T29566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1124.161777][T29566] Call Trace: [ 1124.165084][T29566] dump_stack+0x197/0x210 [ 1124.169433][T29566] should_fail.cold+0xa/0x15 [ 1124.174040][T29566] ? fault_create_debugfs_attr+0x180/0x180 [ 1124.179862][T29566] ? ___might_sleep+0x163/0x2c0 [ 1124.184728][T29566] __should_failslab+0x121/0x190 [ 1124.189681][T29566] ? ratelimit_state_init+0xb0/0xb0 [ 1124.194891][T29566] should_failslab+0x9/0x14 [ 1124.199397][T29566] kmem_cache_alloc+0x2aa/0x710 [ 1124.204257][T29566] ? ratelimit_state_init+0xb0/0xb0 [ 1124.209560][T29566] ext4_alloc_inode+0x1f/0x640 [ 1124.214334][T29566] ? ratelimit_state_init+0xb0/0xb0 [ 1124.219543][T29566] alloc_inode+0x68/0x1e0 [ 1124.223882][T29566] new_inode_pseudo+0x19/0xf0 [ 1124.228565][T29566] new_inode+0x1f/0x40 [ 1124.232638][T29566] __ext4_new_inode+0x3d5/0x4ee0 [ 1124.237602][T29566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1124.243848][T29566] ? __dquot_initialize+0x525/0xd80 [ 1124.249166][T29566] ? ext4_free_inode+0x1490/0x1490 [ 1124.254291][T29566] ? dqget+0x10d0/0x10d0 [ 1124.258558][T29566] ? putname+0xef/0x130 [ 1124.262758][T29566] ext4_mkdir+0x3df/0xe20 [ 1124.267109][T29566] ? ext4_init_dot_dotdot+0x520/0x520 [ 1124.272490][T29566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1124.278728][T29566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1124.285154][T29566] ? security_inode_permission+0xcb/0x100 [ 1124.290876][T29566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1124.297126][T29566] ? security_inode_mkdir+0xe4/0x120 [ 1124.302426][T29566] vfs_mkdir+0x42e/0x670 [ 1124.306761][T29566] do_mkdirat+0x234/0x2a0 [ 1124.311100][T29566] ? __ia32_sys_mknod+0xb0/0xb0 [ 1124.315957][T29566] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1124.321451][T29566] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1124.327539][T29566] ? do_syscall_64+0x26/0x760 [ 1124.332228][T29566] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1124.337524][T29566] __x64_sys_mkdir+0x5c/0x80 [ 1124.342139][T29566] do_syscall_64+0xfa/0x760 [ 1124.346648][T29566] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1124.352537][T29566] RIP: 0033:0x459a57 [ 1124.356434][T29566] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1124.376056][T29566] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1124.384484][T29566] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 0000000000459a57 18:21:39 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1d3, 0x0) 18:21:39 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x232, 0x0) [ 1124.392809][T29566] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 1124.400819][T29566] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1124.408801][T29566] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1124.416783][T29566] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:21:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="021300000200"/15], 0x10}}, 0x0) 18:21:47 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b8, 0x0) 18:21:47 executing program 4 (fault-call:0 fault-nth:41): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:21:47 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x20d, 0x0) 18:21:47 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1d4, 0x0) 18:21:47 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x233, 0x0) [ 1132.760440][T29601] FAULT_INJECTION: forcing a failure. [ 1132.760440][T29601] name failslab, interval 1, probability 0, space 0, times 0 [ 1132.869810][T29601] CPU: 1 PID: 29601 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1132.877850][T29601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1132.887925][T29601] Call Trace: [ 1132.891218][T29601] dump_stack+0x197/0x210 [ 1132.895557][T29601] should_fail.cold+0xa/0x15 [ 1132.900149][T29601] ? fault_create_debugfs_attr+0x180/0x180 [ 1132.906072][T29601] ? ___might_sleep+0x163/0x2c0 [ 1132.910927][T29601] __should_failslab+0x121/0x190 [ 1132.915874][T29601] should_failslab+0x9/0x14 [ 1132.920377][T29601] __kmalloc+0x2e0/0x770 [ 1132.924626][T29601] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1132.930778][T29601] ? ext4_find_extent+0x76e/0x9d0 [ 1132.935808][T29601] ext4_find_extent+0x76e/0x9d0 [ 1132.940663][T29601] ? ext4_map_blocks+0xda8/0x17e0 [ 1132.945691][T29601] ext4_ext_map_blocks+0x1dc/0x3ac0 [ 1132.950909][T29601] ? ext4_ext_release+0x10/0x10 [ 1132.955765][T29601] ? lock_acquire+0x190/0x410 [ 1132.960469][T29601] ? ext4_map_blocks+0x4b3/0x17e0 [ 1132.965502][T29601] ? __kasan_check_write+0x14/0x20 [ 1132.970741][T29601] ? down_write+0xdf/0x150 [ 1132.975159][T29601] ? down_write_killable+0x170/0x170 [ 1132.980444][T29601] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1132.986681][T29601] ? ext4_es_lookup_extent+0x426/0xd40 [ 1132.992275][T29601] ext4_map_blocks+0x52b/0x17e0 [ 1132.997134][T29601] ? ext4_issue_zeroout+0x190/0x190 [ 1133.002345][T29601] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1133.008350][T29601] ? __kasan_check_write+0x14/0x20 [ 1133.013472][T29601] ext4_getblk+0xc4/0x570 [ 1133.017814][T29601] ? ext4_iomap_begin+0x1000/0x1000 [ 1133.023030][T29601] ext4_bread+0x8f/0x390 [ 1133.027281][T29601] ? ext4_getblk+0x570/0x570 [ 1133.031894][T29601] ext4_append+0x155/0x370 [ 1133.036320][T29601] ext4_mkdir+0x632/0xe20 [ 1133.040674][T29601] ? ext4_init_dot_dotdot+0x520/0x520 [ 1133.046047][T29601] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1133.052376][T29601] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1133.058625][T29601] ? security_inode_permission+0xcb/0x100 [ 1133.064354][T29601] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 18:21:48 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1d5, 0x0) 18:21:48 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x234, 0x0) [ 1133.070599][T29601] ? security_inode_mkdir+0xe4/0x120 [ 1133.075884][T29601] vfs_mkdir+0x42e/0x670 [ 1133.080220][T29601] do_mkdirat+0x234/0x2a0 [ 1133.084557][T29601] ? __ia32_sys_mknod+0xb0/0xb0 [ 1133.089495][T29601] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1133.094958][T29601] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1133.101029][T29601] ? do_syscall_64+0x26/0x760 [ 1133.105711][T29601] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1133.111007][T29601] __x64_sys_mkdir+0x5c/0x80 [ 1133.115617][T29601] do_syscall_64+0xfa/0x760 [ 1133.120126][T29601] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1133.126013][T29601] RIP: 0033:0x459a57 [ 1133.129912][T29601] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1133.149524][T29601] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1133.149538][T29601] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 0000000000459a57 18:21:48 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b9, 0x0) [ 1133.149546][T29601] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 1133.149553][T29601] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1133.149562][T29601] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1133.149569][T29601] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:21:48 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x20e, 0x0) 18:21:48 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ba, 0x0) 18:21:48 executing program 4 (fault-call:0 fault-nth:42): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1133.685786][T29633] FAULT_INJECTION: forcing a failure. [ 1133.685786][T29633] name failslab, interval 1, probability 0, space 0, times 0 [ 1133.758122][T29633] CPU: 1 PID: 29633 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1133.766068][T29633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1133.776128][T29633] Call Trace: [ 1133.779426][T29633] dump_stack+0x197/0x210 [ 1133.783770][T29633] should_fail.cold+0xa/0x15 [ 1133.788382][T29633] ? fault_create_debugfs_attr+0x180/0x180 [ 1133.794206][T29633] ? ___might_sleep+0x163/0x2c0 [ 1133.799065][T29633] __should_failslab+0x121/0x190 [ 1133.804012][T29633] should_failslab+0x9/0x14 [ 1133.808527][T29633] __kmalloc+0x2e0/0x770 [ 1133.812788][T29633] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1133.818938][T29633] ? ext4_find_extent+0x76e/0x9d0 [ 1133.823959][T29633] ext4_find_extent+0x76e/0x9d0 [ 1133.828823][T29633] ? ___might_sleep+0x163/0x2c0 [ 1133.833689][T29633] ext4_ext_map_blocks+0x1dc/0x3ac0 [ 1133.838904][T29633] ? mark_held_locks+0xf0/0xf0 [ 1133.843866][T29633] ? ext4_ext_release+0x10/0x10 [ 1133.848755][T29633] ? __kasan_check_write+0x14/0x20 [ 1133.853893][T29633] ? down_read+0x109/0x430 [ 1133.858321][T29633] ? down_read_killable+0x490/0x490 [ 1133.863536][T29633] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1133.869786][T29633] ? ext4_es_lookup_extent+0x426/0xd40 [ 1133.875264][T29633] ext4_map_blocks+0xdc7/0x17e0 [ 1133.880125][T29633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1133.886416][T29633] ? ext4_issue_zeroout+0x190/0x190 [ 1133.891632][T29633] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1133.897621][T29633] ? __kasan_check_write+0x14/0x20 [ 1133.902756][T29633] ext4_getblk+0xc4/0x570 [ 1133.907201][T29633] ? ext4_iomap_begin+0x1000/0x1000 [ 1133.912424][T29633] ext4_bread+0x8f/0x390 [ 1133.916682][T29633] ? ext4_getblk+0x570/0x570 [ 1133.921280][T29633] ext4_append+0x155/0x370 [ 1133.925696][T29633] ext4_mkdir+0x632/0xe20 [ 1133.925717][T29633] ? ext4_init_dot_dotdot+0x520/0x520 [ 1133.925732][T29633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1133.925742][T29633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1133.925760][T29633] ? security_inode_permission+0xcb/0x100 [ 1133.925773][T29633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1133.925786][T29633] ? security_inode_mkdir+0xe4/0x120 [ 1133.925803][T29633] vfs_mkdir+0x42e/0x670 [ 1133.925823][T29633] do_mkdirat+0x234/0x2a0 [ 1133.925841][T29633] ? __ia32_sys_mknod+0xb0/0xb0 [ 1133.925858][T29633] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1133.925876][T29633] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1133.925893][T29633] ? do_syscall_64+0x26/0x760 [ 1133.995101][T29633] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1134.000406][T29633] __x64_sys_mkdir+0x5c/0x80 [ 1134.005005][T29633] do_syscall_64+0xfa/0x760 [ 1134.009505][T29633] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1134.015390][T29633] RIP: 0033:0x459a57 [ 1134.019282][T29633] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1134.039410][T29633] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1134.047896][T29633] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 0000000000459a57 [ 1134.055860][T29633] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 1134.063844][T29633] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1134.071798][T29633] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1134.079752][T29633] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 [ 1134.092651][T29633] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:21:57 executing program 2: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x209, 0x0) 18:21:57 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1d6, 0x0) 18:21:57 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x235, 0x0) 18:21:57 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x20f, 0x0) 18:21:57 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2bb, 0x0) 18:21:57 executing program 4 (fault-call:0 fault-nth:43): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1142.107615][T29660] FAULT_INJECTION: forcing a failure. [ 1142.107615][T29660] name failslab, interval 1, probability 0, space 0, times 0 [ 1142.120426][T29660] CPU: 1 PID: 29660 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1142.128325][T29660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1142.138384][T29660] Call Trace: [ 1142.141687][T29660] dump_stack+0x197/0x210 [ 1142.146034][T29660] should_fail.cold+0xa/0x15 [ 1142.150637][T29660] ? fault_create_debugfs_attr+0x180/0x180 [ 1142.156470][T29660] __should_failslab+0x121/0x190 [ 1142.161417][T29660] should_failslab+0x9/0x14 [ 1142.165919][T29660] kmem_cache_alloc+0x47/0x710 [ 1142.170688][T29660] ? __kasan_check_write+0x14/0x20 [ 1142.175802][T29660] ? do_raw_write_lock+0x124/0x290 [ 1142.180921][T29660] __es_insert_extent+0x2cc/0xf20 [ 1142.185957][T29660] ext4_es_insert_extent+0x2d2/0xa70 [ 1142.191253][T29660] ? ext4_es_scan_clu+0xe0/0xe0 [ 1142.196111][T29660] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1142.202094][T29660] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1142.208335][T29660] ? ext4_es_find_extent_range+0x131/0x660 [ 1142.214143][T29660] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 1142.219693][T29660] ? ext4_rereserve_cluster+0x240/0x240 [ 1142.225250][T29660] ? ext4_find_extent+0x76e/0x9d0 [ 1142.230276][T29660] ? ext4_find_extent+0x6a6/0x9d0 [ 1142.235350][T29660] ext4_ext_map_blocks+0x1930/0x3ac0 [ 1142.240655][T29660] ? ext4_ext_release+0x10/0x10 [ 1142.245607][T29660] ? __kasan_check_write+0x14/0x20 [ 1142.250738][T29660] ? down_read+0x109/0x430 [ 1142.255286][T29660] ? down_read_killable+0x490/0x490 [ 1142.260488][T29660] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1142.266737][T29660] ? ext4_es_lookup_extent+0x426/0xd40 [ 1142.272212][T29660] ext4_map_blocks+0xdc7/0x17e0 [ 1142.277070][T29660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1142.283459][T29660] ? ext4_issue_zeroout+0x190/0x190 [ 1142.288667][T29660] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1142.295091][T29660] ? __kasan_check_write+0x14/0x20 [ 1142.300210][T29660] ext4_getblk+0xc4/0x570 [ 1142.304553][T29660] ? ext4_iomap_begin+0x1000/0x1000 [ 1142.309769][T29660] ext4_bread+0x8f/0x390 [ 1142.314016][T29660] ? ext4_getblk+0x570/0x570 [ 1142.318621][T29660] ext4_append+0x155/0x370 [ 1142.323050][T29660] ext4_mkdir+0x632/0xe20 [ 1142.327397][T29660] ? ext4_init_dot_dotdot+0x520/0x520 [ 1142.332777][T29660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1142.339016][T29660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1142.345369][T29660] ? security_inode_permission+0xcb/0x100 [ 1142.351095][T29660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1142.357339][T29660] ? security_inode_mkdir+0xe4/0x120 [ 1142.362634][T29660] vfs_mkdir+0x42e/0x670 [ 1142.367109][T29660] do_mkdirat+0x234/0x2a0 [ 1142.371459][T29660] ? __ia32_sys_mknod+0xb0/0xb0 [ 1142.376319][T29660] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1142.381874][T29660] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1142.387948][T29660] ? do_syscall_64+0x26/0x760 [ 1142.392640][T29660] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1142.397964][T29660] __x64_sys_mkdir+0x5c/0x80 [ 1142.402563][T29660] do_syscall_64+0xfa/0x760 [ 1142.407073][T29660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1142.413058][T29660] RIP: 0033:0x459a57 [ 1142.417055][T29660] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1142.436842][T29660] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1142.445301][T29660] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 0000000000459a57 18:21:57 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1d7, 0x0) 18:21:57 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x210, 0x0) [ 1142.453279][T29660] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 1142.461259][T29660] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1142.469261][T29660] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1142.477243][T29660] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:21:57 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2bc, 0x0) [ 1142.507609][T29660] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:21:57 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x236, 0x0) 18:21:57 executing program 4 (fault-call:0 fault-nth:44): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:21:57 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2bd, 0x0) [ 1142.890162][T29686] FAULT_INJECTION: forcing a failure. [ 1142.890162][T29686] name failslab, interval 1, probability 0, space 0, times 0 [ 1142.939451][T29686] CPU: 0 PID: 29686 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1142.947398][T29686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1142.957466][T29686] Call Trace: [ 1142.960774][T29686] dump_stack+0x197/0x210 [ 1142.965131][T29686] should_fail.cold+0xa/0x15 [ 1142.969872][T29686] ? fault_create_debugfs_attr+0x180/0x180 [ 1142.975699][T29686] ? ___might_sleep+0x163/0x2c0 [ 1142.980576][T29686] __should_failslab+0x121/0x190 [ 1142.985529][T29686] should_failslab+0x9/0x14 [ 1142.991269][T29686] __kmalloc_track_caller+0x2dc/0x760 [ 1142.996675][T29686] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1143.002925][T29686] ? strndup_user+0x77/0xd0 [ 1143.007444][T29686] memdup_user+0x26/0xb0 [ 1143.011691][T29686] strndup_user+0x77/0xd0 [ 1143.016027][T29686] ksys_mount+0x7b/0x150 [ 1143.020292][T29686] __x64_sys_mount+0xbe/0x150 [ 1143.024978][T29686] do_syscall_64+0xfa/0x760 [ 1143.029487][T29686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1143.035381][T29686] RIP: 0033:0x45d08a [ 1143.039285][T29686] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1143.059074][T29686] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1143.067502][T29686] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a [ 1143.075474][T29686] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1143.075482][T29686] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1143.075490][T29686] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1143.075498][T29686] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:22:04 executing program 2: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x209, 0x0) 18:22:04 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2be, 0x0) 18:22:04 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x237, 0x0) 18:22:04 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x211, 0x0) 18:22:04 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1d8, 0x0) 18:22:04 executing program 4 (fault-call:0 fault-nth:45): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1149.308688][T29713] FAULT_INJECTION: forcing a failure. [ 1149.308688][T29713] name failslab, interval 1, probability 0, space 0, times 0 [ 1149.355241][T29713] CPU: 0 PID: 29713 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1149.363187][T29713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1149.373261][T29713] Call Trace: [ 1149.376566][T29713] dump_stack+0x197/0x210 [ 1149.380908][T29713] should_fail.cold+0xa/0x15 [ 1149.385514][T29713] ? fault_create_debugfs_attr+0x180/0x180 [ 1149.391341][T29713] ? ___might_sleep+0x163/0x2c0 [ 1149.396215][T29713] __should_failslab+0x121/0x190 [ 1149.401285][T29713] should_failslab+0x9/0x14 [ 1149.405918][T29713] kmem_cache_alloc+0x2aa/0x710 [ 1149.410776][T29713] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1149.417021][T29713] ? __mark_inode_dirty+0x3d1/0x1390 [ 1149.422313][T29713] ext4_mb_new_blocks+0x5b9/0x3900 [ 1149.427518][T29713] ? ext4_find_extent+0x76e/0x9d0 [ 1149.432576][T29713] ext4_ext_map_blocks+0x23c9/0x3ac0 [ 1149.437871][T29713] ? ext4_ext_release+0x10/0x10 [ 1149.442725][T29713] ? lock_acquire+0x190/0x410 [ 1149.447402][T29713] ? ext4_map_blocks+0x4b3/0x17e0 [ 1149.452443][T29713] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1149.458687][T29713] ? ext4_es_lookup_extent+0x426/0xd40 [ 1149.464157][T29713] ext4_map_blocks+0x52b/0x17e0 [ 1149.469158][T29713] ? ext4_issue_zeroout+0x190/0x190 [ 1149.474370][T29713] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1149.480359][T29713] ? __kasan_check_write+0x14/0x20 [ 1149.485490][T29713] ext4_getblk+0xc4/0x570 [ 1149.489831][T29713] ? ext4_iomap_begin+0x1000/0x1000 [ 1149.495050][T29713] ext4_bread+0x8f/0x390 [ 1149.499304][T29713] ? ext4_getblk+0x570/0x570 [ 1149.503912][T29713] ext4_append+0x155/0x370 [ 1149.508341][T29713] ext4_mkdir+0x632/0xe20 [ 1149.512719][T29713] ? ext4_init_dot_dotdot+0x520/0x520 [ 1149.518102][T29713] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1149.524351][T29713] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1149.530603][T29713] ? security_inode_permission+0xcb/0x100 [ 1149.530620][T29713] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1149.530638][T29713] ? security_inode_mkdir+0xe4/0x120 [ 1149.547950][T29713] vfs_mkdir+0x42e/0x670 18:22:04 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2bf, 0x0) [ 1149.547969][T29713] do_mkdirat+0x234/0x2a0 [ 1149.547988][T29713] ? __ia32_sys_mknod+0xb0/0xb0 [ 1149.548003][T29713] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1149.548021][T29713] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1149.574243][T29713] ? do_syscall_64+0x26/0x760 [ 1149.578936][T29713] ? lockdep_hardirqs_on+0x421/0x5e0 [ 1149.584238][T29713] __x64_sys_mkdir+0x5c/0x80 [ 1149.588836][T29713] do_syscall_64+0xfa/0x760 [ 1149.593346][T29713] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1149.599590][T29713] RIP: 0033:0x459a57 18:22:04 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c0, 0x0) [ 1149.603494][T29713] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1149.623285][T29713] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1149.631690][T29713] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 0000000000459a57 [ 1149.631698][T29713] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 1149.631705][T29713] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 18:22:04 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x212, 0x0) 18:22:04 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1d9, 0x0) 18:22:04 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x238, 0x0) [ 1149.631711][T29713] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1149.631719][T29713] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:22:04 executing program 4 (fault-call:0 fault-nth:46): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1149.953700][T29742] FAULT_INJECTION: forcing a failure. [ 1149.953700][T29742] name failslab, interval 1, probability 0, space 0, times 0 [ 1149.966743][T29742] CPU: 1 PID: 29742 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1149.974640][T29742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1149.984952][T29742] Call Trace: [ 1149.988259][T29742] dump_stack+0x197/0x210 [ 1149.992611][T29742] should_fail.cold+0xa/0x15 [ 1149.997222][T29742] ? fault_create_debugfs_attr+0x180/0x180 [ 1150.003036][T29742] ? find_held_lock+0x35/0x130 [ 1150.007814][T29742] ? __sigqueue_alloc+0x173/0x4d0 [ 1150.012852][T29742] __should_failslab+0x121/0x190 [ 1150.017793][T29742] should_failslab+0x9/0x14 [ 1150.022306][T29742] kmem_cache_alloc+0x47/0x710 [ 1150.027070][T29742] ? __kasan_check_read+0x11/0x20 [ 1150.032105][T29742] __sigqueue_alloc+0x268/0x4d0 [ 1150.036963][T29742] __send_signal+0x863/0x1090 [ 1150.041744][T29742] send_signal+0x4c1/0x7d0 [ 1150.046171][T29742] force_sig_info_to_task+0x278/0x340 [ 1150.051549][T29742] force_sig_fault+0xbe/0x100 [ 1150.056252][T29742] ? force_sig_fault_to_task+0xf0/0xf0 [ 1150.061742][T29742] ? __kasan_check_write+0x14/0x20 [ 1150.066866][T29742] ? trace_hardirqs_on+0x67/0x240 [ 1150.071990][T29742] __bad_area_nosemaphore+0x32e/0x420 [ 1150.077368][T29742] ? vmacache_find+0x65/0x310 [ 1150.082062][T29742] bad_area+0x69/0x80 [ 1150.086054][T29742] __do_page_fault+0xa28/0xdd0 [ 1150.090830][T29742] ? page_fault+0x16/0x40 [ 1150.095171][T29742] do_page_fault+0x38/0x590 [ 1150.099683][T29742] page_fault+0x39/0x40 [ 1150.103844][T29742] RIP: 0033:0x45423f [ 1150.107749][T29742] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 1150.127363][T29742] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00010283 [ 1150.133439][T29742] RAX: 00007fdabd7d0b40 RBX: 0000000020000268 RCX: 0000000000000000 [ 1150.141424][T29742] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007fdabd7d0b40 [ 1150.149482][T29742] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a [ 1150.157566][T29742] R10: 0000000000000075 R11: 00000000004e76c0 R12: 0000000000000004 [ 1150.157643][T29742] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 [ 1150.206732][T29742] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:22:11 executing program 2: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x209, 0x0) 18:22:11 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x239, 0x0) 18:22:11 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c1, 0x0) 18:22:11 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1da, 0x0) 18:22:11 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x213, 0x0) 18:22:11 executing program 4 (fault-call:0 fault-nth:47): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1156.660917][T29765] FAULT_INJECTION: forcing a failure. [ 1156.660917][T29765] name failslab, interval 1, probability 0, space 0, times 0 [ 1156.686989][T29765] CPU: 1 PID: 29765 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1156.694940][T29765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1156.705010][T29765] Call Trace: [ 1156.708315][T29765] dump_stack+0x197/0x210 [ 1156.712660][T29765] should_fail.cold+0xa/0x15 [ 1156.717270][T29765] ? fault_create_debugfs_attr+0x180/0x180 [ 1156.723091][T29765] ? ___might_sleep+0x163/0x2c0 [ 1156.728041][T29765] __should_failslab+0x121/0x190 [ 1156.732992][T29765] should_failslab+0x9/0x14 [ 1156.737492][T29765] __kmalloc+0x2e0/0x770 [ 1156.741735][T29765] ? save_stack+0x5c/0x90 [ 1156.746060][T29765] ? save_stack+0x23/0x90 [ 1156.750400][T29765] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1156.755868][T29765] tomoyo_encode2.part.0+0xf5/0x400 [ 1156.761177][T29765] ? do_syscall_64+0xfa/0x760 [ 1156.765862][T29765] tomoyo_encode+0x2b/0x50 [ 1156.770277][T29765] tomoyo_mount_acl+0xe0/0x840 [ 1156.775047][T29765] ? __kasan_check_read+0x11/0x20 [ 1156.780419][T29765] ? mark_lock+0xc2/0x1220 [ 1156.784833][T29765] ? lock_downgrade+0x920/0x920 [ 1156.789701][T29765] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1156.795251][T29765] ? __kasan_check_read+0x11/0x20 [ 1156.800281][T29765] ? __lock_acquire+0x8a0/0x4a00 [ 1156.805235][T29765] ? debug_smp_processor_id+0x3c/0x214 [ 1156.810701][T29765] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1156.816884][T29765] ? lock_acquire+0x190/0x410 [ 1156.821569][T29765] ? tomoyo_mount_permission+0x10a/0x410 [ 1156.827241][T29765] tomoyo_mount_permission+0x16a/0x410 [ 1156.832707][T29765] ? tomoyo_mount_permission+0x10a/0x410 [ 1156.838575][T29765] ? tomoyo_mount_acl+0x840/0x840 [ 1156.843749][T29765] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1156.850054][T29765] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1156.856301][T29765] ? strncpy_from_user+0x2b4/0x400 [ 1156.861421][T29765] tomoyo_sb_mount+0x35/0x40 [ 1156.866024][T29765] security_sb_mount+0x87/0xd0 [ 1156.870808][T29765] do_mount+0x1d4/0x1b60 [ 1156.875151][T29765] ? copy_mount_string+0x40/0x40 [ 1156.880102][T29765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1156.886429][T29765] ? copy_mount_options+0x2e8/0x3f0 [ 1156.891633][T29765] ksys_mount+0xdb/0x150 [ 1156.895883][T29765] __x64_sys_mount+0xbe/0x150 [ 1156.900578][T29765] do_syscall_64+0xfa/0x760 [ 1156.905089][T29765] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1156.910986][T29765] RIP: 0033:0x45d08a [ 1156.914888][T29765] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1156.934621][T29765] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1156.943049][T29765] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a [ 1156.951123][T29765] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 18:22:11 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x214, 0x0) [ 1156.959099][T29765] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1156.967094][T29765] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1156.975069][T29765] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:22:12 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x23a, 0x0) 18:22:12 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c2, 0x0) 18:22:12 executing program 4 (fault-call:0 fault-nth:48): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:22:12 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1db, 0x0) 18:22:12 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x215, 0x0) [ 1157.606297][T29801] FAULT_INJECTION: forcing a failure. [ 1157.606297][T29801] name failslab, interval 1, probability 0, space 0, times 0 [ 1157.623428][T29801] CPU: 1 PID: 29801 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1157.631352][T29801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1157.641411][T29801] Call Trace: [ 1157.644705][T29801] dump_stack+0x197/0x210 [ 1157.649047][T29801] should_fail.cold+0xa/0x15 [ 1157.653645][T29801] ? fault_create_debugfs_attr+0x180/0x180 [ 1157.659470][T29801] ? ___might_sleep+0x163/0x2c0 [ 1157.664461][T29801] __should_failslab+0x121/0x190 [ 1157.669409][T29801] should_failslab+0x9/0x14 [ 1157.673919][T29801] __kmalloc_track_caller+0x2dc/0x760 [ 1157.679296][T29801] ? setup_sigcontext+0x7d0/0x7d0 [ 1157.684326][T29801] ? __bad_area_nosemaphore+0xb3/0x420 [ 1157.689787][T29801] ? strndup_user+0x77/0xd0 [ 1157.694297][T29801] memdup_user+0x26/0xb0 [ 1157.698632][T29801] strndup_user+0x77/0xd0 [ 1157.702966][T29801] ksys_mount+0x3c/0x150 [ 1157.707224][T29801] __x64_sys_mount+0xbe/0x150 [ 1157.711906][T29801] do_syscall_64+0xfa/0x760 [ 1157.716416][T29801] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1157.722327][T29801] RIP: 0033:0x45d08a [ 1157.726431][T29801] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1157.746170][T29801] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1157.754639][T29801] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a [ 1157.762615][T29801] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1157.770580][T29801] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1157.778641][T29801] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1157.786619][T29801] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:22:20 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000600)='/dev/cec#\x00', 0x2, 0x2) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000640)={0x1c00000000000000, 0x0, 0x5, 0x4}) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f00000000c0)={0x2, 0x1000, 0x81, 0xffff, 0x2, 0x3}) fcntl$getflags(r1, 0xb) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) sendmsg$can_raw(r1, 0x0, 0x8840) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x10000000000004}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0xa9, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r1, 0x0, 0x10, &(0x7f0000000440)='bond0\x00\x00\x86\x9e\x00\a\x8a\xc0\x06\x00#', 0xffffffffffffffff}, 0x21a) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000680)) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) write$capi20_data(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:22:20 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1dc, 0x0) 18:22:20 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c3, 0x0) 18:22:20 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x216, 0x0) 18:22:20 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x23b, 0x0) 18:22:20 executing program 4 (fault-call:0 fault-nth:49): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1165.179522][T29818] FAULT_INJECTION: forcing a failure. [ 1165.179522][T29818] name failslab, interval 1, probability 0, space 0, times 0 [ 1165.234691][T29818] CPU: 1 PID: 29818 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1165.242760][T29818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1165.253392][T29818] Call Trace: [ 1165.256708][T29818] dump_stack+0x197/0x210 [ 1165.261060][T29818] should_fail.cold+0xa/0x15 [ 1165.265671][T29818] ? fault_create_debugfs_attr+0x180/0x180 [ 1165.271490][T29818] ? ___might_sleep+0x163/0x2c0 [ 1165.276362][T29818] __should_failslab+0x121/0x190 [ 1165.281334][T29818] should_failslab+0x9/0x14 [ 1165.285843][T29818] __kmalloc_track_caller+0x2dc/0x760 [ 1165.291226][T29818] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1165.297483][T29818] ? strndup_user+0x77/0xd0 [ 1165.302004][T29818] memdup_user+0x26/0xb0 [ 1165.306951][T29818] strndup_user+0x77/0xd0 [ 1165.311287][T29818] ksys_mount+0x7b/0x150 [ 1165.315539][T29818] __x64_sys_mount+0xbe/0x150 [ 1165.320426][T29818] do_syscall_64+0xfa/0x760 [ 1165.324948][T29818] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1165.330847][T29818] RIP: 0033:0x45d08a [ 1165.334834][T29818] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1165.354450][T29818] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1165.363047][T29818] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a [ 1165.371027][T29818] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 18:22:20 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c4, 0x0) [ 1165.379005][T29818] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1165.387092][T29818] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1165.395072][T29818] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:22:20 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1dd, 0x0) 18:22:20 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x23c, 0x0) 18:22:20 executing program 4 (fault-call:0 fault-nth:50): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:22:20 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x217, 0x0) 18:22:20 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c5, 0x0) [ 1165.794711][T29846] FAULT_INJECTION: forcing a failure. [ 1165.794711][T29846] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1165.807985][T29846] CPU: 0 PID: 29846 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1165.815879][T29846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1165.815887][T29846] Call Trace: [ 1165.815911][T29846] dump_stack+0x197/0x210 [ 1165.815940][T29846] should_fail.cold+0xa/0x15 [ 1165.839917][T29846] ? __kmalloc+0x163/0x770 [ 1165.844352][T29846] ? fault_create_debugfs_attr+0x180/0x180 [ 1165.850170][T29846] ? do_mount+0x1d4/0x1b60 [ 1165.854595][T29846] ? ksys_mount+0xdb/0x150 [ 1165.860149][T29846] ? __x64_sys_mount+0xbe/0x150 [ 1165.866047][T29846] ? do_syscall_64+0xfa/0x760 [ 1165.870732][T29846] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1165.876818][T29846] should_fail_alloc_page+0x50/0x60 [ 1165.876833][T29846] __alloc_pages_nodemask+0x1a1/0x900 [ 1165.876849][T29846] ? kernel_text_address+0x73/0xf0 [ 1165.876865][T29846] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1165.876884][T29846] ? unwind_get_return_address+0x61/0xa0 [ 1165.903931][T29846] ? profile_setup.cold+0xbb/0xbb [ 1165.909098][T29846] ? fault_create_debugfs_attr+0x180/0x180 [ 1165.915046][T29846] cache_grow_begin+0x90/0xd20 [ 1165.920774][T29846] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1165.926497][T29846] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1165.932753][T29846] __kmalloc+0x6b2/0x770 [ 1165.937001][T29846] ? __kmalloc+0x608/0x770 [ 1165.941430][T29846] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1165.947165][T29846] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1165.952723][T29846] tomoyo_mount_acl+0x149/0x840 [ 1165.957583][T29846] ? __kasan_check_read+0x11/0x20 [ 1165.962622][T29846] ? mark_lock+0xc2/0x1220 [ 1165.967042][T29846] ? lock_downgrade+0x920/0x920 [ 1165.971900][T29846] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1165.977555][T29846] ? __kasan_check_read+0x11/0x20 [ 1165.982590][T29846] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1165.988770][T29846] ? lock_acquire+0x190/0x410 [ 1165.993447][T29846] ? tomoyo_mount_permission+0x10a/0x410 [ 1165.999089][T29846] tomoyo_mount_permission+0x16a/0x410 [ 1166.004548][T29846] ? tomoyo_mount_permission+0x10a/0x410 [ 1166.010187][T29846] ? tomoyo_mount_acl+0x840/0x840 [ 1166.015214][T29846] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1166.021465][T29846] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1166.027716][T29846] ? strncpy_from_user+0x2b4/0x400 [ 1166.032832][T29846] tomoyo_sb_mount+0x35/0x40 [ 1166.037441][T29846] security_sb_mount+0x87/0xd0 [ 1166.042331][T29846] do_mount+0x1d4/0x1b60 [ 1166.046671][T29846] ? retint_kernel+0x2b/0x2b [ 1166.051272][T29846] ? copy_mount_string+0x40/0x40 [ 1166.056220][T29846] ? copy_mount_options+0x260/0x3f0 [ 1166.061418][T29846] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1166.067664][T29846] ? copy_mount_options+0x2e8/0x3f0 [ 1166.072875][T29846] ksys_mount+0xdb/0x150 [ 1166.077125][T29846] __x64_sys_mount+0xbe/0x150 [ 1166.081816][T29846] do_syscall_64+0xfa/0x760 [ 1166.086327][T29846] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1166.092219][T29846] RIP: 0033:0x45d08a [ 1166.096112][T29846] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1166.116076][T29846] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1166.116091][T29846] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a [ 1166.116100][T29846] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1166.116113][T29846] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1166.132463][T29846] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1166.132472][T29846] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 [ 1166.157276][T29846] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:22:27 executing program 2: ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x4, 0x9}) openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000005c0)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x10000000000004}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0xa9, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 18:22:27 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1de, 0x0) 18:22:27 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c6, 0x0) 18:22:27 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x218, 0x0) 18:22:27 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x23d, 0x0) 18:22:27 executing program 4 (fault-call:0 fault-nth:51): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1172.357454][T29871] FAULT_INJECTION: forcing a failure. [ 1172.357454][T29871] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1172.370822][T29871] CPU: 0 PID: 29871 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1172.378730][T29871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1172.388799][T29871] Call Trace: [ 1172.392101][T29871] dump_stack+0x197/0x210 [ 1172.396452][T29871] should_fail.cold+0xa/0x15 [ 1172.401045][T29871] ? __kmalloc+0x163/0x770 [ 1172.405487][T29871] ? fault_create_debugfs_attr+0x180/0x180 [ 1172.411300][T29871] ? do_mount+0x1d4/0x1b60 [ 1172.415721][T29871] ? ksys_mount+0xdb/0x150 [ 1172.420150][T29871] ? __x64_sys_mount+0xbe/0x150 [ 1172.425005][T29871] ? do_syscall_64+0xfa/0x760 [ 1172.429683][T29871] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1172.435948][T29871] should_fail_alloc_page+0x50/0x60 [ 1172.441163][T29871] __alloc_pages_nodemask+0x1a1/0x900 [ 1172.446564][T29871] ? kernel_text_address+0x73/0xf0 [ 1172.451685][T29871] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1172.457412][T29871] ? unwind_get_return_address+0x61/0xa0 [ 1172.463069][T29871] ? profile_setup.cold+0xbb/0xbb [ 1172.468109][T29871] ? fault_create_debugfs_attr+0x180/0x180 [ 1172.473934][T29871] cache_grow_begin+0x90/0xd20 [ 1172.478711][T29871] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1172.484551][T29871] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1172.490816][T29871] __kmalloc+0x6b2/0x770 [ 1172.495074][T29871] ? __kmalloc+0x608/0x770 [ 1172.499507][T29871] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1172.505759][T29871] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1172.511319][T29871] tomoyo_mount_acl+0x149/0x840 [ 1172.516192][T29871] ? __kasan_check_read+0x11/0x20 [ 1172.521230][T29871] ? mark_lock+0xc2/0x1220 [ 1172.525654][T29871] ? lock_downgrade+0x920/0x920 [ 1172.530512][T29871] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1172.536067][T29871] ? __kasan_check_read+0x11/0x20 [ 1172.541103][T29871] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1172.547298][T29871] ? lock_acquire+0x190/0x410 [ 1172.552446][T29871] ? tomoyo_mount_permission+0x10a/0x410 18:22:27 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c7, 0x0) [ 1172.558094][T29871] tomoyo_mount_permission+0x16a/0x410 [ 1172.563567][T29871] ? tomoyo_mount_permission+0x10a/0x410 [ 1172.569480][T29871] ? tomoyo_mount_acl+0x840/0x840 [ 1172.574517][T29871] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1172.580794][T29871] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1172.587044][T29871] ? strncpy_from_user+0x2b4/0x400 [ 1172.587063][T29871] tomoyo_sb_mount+0x35/0x40 [ 1172.587081][T29871] security_sb_mount+0x87/0xd0 [ 1172.587103][T29871] do_mount+0x1d4/0x1b60 [ 1172.587121][T29871] ? copy_mount_string+0x40/0x40 [ 1172.587139][T29871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1172.587153][T29871] ? copy_mount_options+0x2e8/0x3f0 [ 1172.587170][T29871] ksys_mount+0xdb/0x150 [ 1172.587184][T29871] __x64_sys_mount+0xbe/0x150 [ 1172.587202][T29871] do_syscall_64+0xfa/0x760 [ 1172.587219][T29871] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1172.587231][T29871] RIP: 0033:0x45d08a 18:22:27 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x23e, 0x0) [ 1172.587245][T29871] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1172.587258][T29871] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1172.673713][T29871] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a [ 1172.681697][T29871] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1172.689680][T29871] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1172.697666][T29871] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 18:22:27 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1df, 0x0) 18:22:27 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c8, 0x0) [ 1172.705655][T29871] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 [ 1172.716546][T29871] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:22:27 executing program 4 (fault-call:0 fault-nth:52): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:22:28 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x219, 0x0) [ 1172.990097][T29895] FAULT_INJECTION: forcing a failure. [ 1172.990097][T29895] name failslab, interval 1, probability 0, space 0, times 0 [ 1173.080556][T29895] CPU: 1 PID: 29895 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1173.088493][T29895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1173.098541][T29895] Call Trace: [ 1173.101829][T29895] dump_stack+0x197/0x210 [ 1173.106153][T29895] should_fail.cold+0xa/0x15 [ 1173.110754][T29895] ? fault_create_debugfs_attr+0x180/0x180 [ 1173.116608][T29895] ? ___might_sleep+0x163/0x2c0 [ 1173.121447][T29895] __should_failslab+0x121/0x190 [ 1173.126378][T29895] should_failslab+0x9/0x14 [ 1173.130865][T29895] kmem_cache_alloc+0x2aa/0x710 [ 1173.135702][T29895] ? __kasan_check_write+0x14/0x20 [ 1173.140885][T29895] getname_kernel+0x53/0x370 [ 1173.145462][T29895] kern_path+0x20/0x40 [ 1173.149516][T29895] tomoyo_mount_acl+0x28c/0x840 [ 1173.154370][T29895] ? mark_lock+0xc2/0x1220 [ 1173.158944][T29895] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1173.164473][T29895] ? __kasan_check_read+0x11/0x20 [ 1173.169485][T29895] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1173.175740][T29895] ? lock_acquire+0x190/0x410 [ 1173.180401][T29895] ? tomoyo_mount_permission+0x10a/0x410 [ 1173.186020][T29895] tomoyo_mount_permission+0x16a/0x410 [ 1173.191459][T29895] ? tomoyo_mount_permission+0x10a/0x410 [ 1173.197074][T29895] ? tomoyo_mount_acl+0x840/0x840 [ 1173.202104][T29895] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1173.208352][T29895] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1173.214589][T29895] ? strncpy_from_user+0x2b4/0x400 [ 1173.219697][T29895] tomoyo_sb_mount+0x35/0x40 [ 1173.224368][T29895] security_sb_mount+0x87/0xd0 [ 1173.229124][T29895] do_mount+0x1d4/0x1b60 [ 1173.233358][T29895] ? copy_mount_string+0x40/0x40 [ 1173.238283][T29895] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1173.244619][T29895] ? _copy_from_user+0x12c/0x1a0 [ 1173.249552][T29895] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1173.255783][T29895] ? copy_mount_options+0x2e8/0x3f0 [ 1173.260977][T29895] ksys_mount+0xdb/0x150 [ 1173.265214][T29895] __x64_sys_mount+0xbe/0x150 [ 1173.269886][T29895] do_syscall_64+0xfa/0x760 [ 1173.274382][T29895] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1173.280259][T29895] RIP: 0033:0x45d08a [ 1173.284140][T29895] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1173.303842][T29895] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1173.312239][T29895] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a [ 1173.320196][T29895] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1173.328152][T29895] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1173.336192][T29895] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1173.344144][T29895] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:22:36 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x100000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f00000000c0)={"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"}) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000000)=0x100005) r4 = syz_open_procfs(0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(r4, 0x10e, 0x6, &(0x7f0000000140)={0xffffff80, 0x6, 0x78c, 0x3}, 0x10) sendmsg$inet_sctp(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000080)="5360d6429ea27b70edbe716e715915f9d8ebea8a1cac3b1d2b6a5fbf9fad5b01aa76", 0x22}, {&(0x7f0000000500)="6ec99fd516fbc5cfcd1dbfd3719e9c", 0xf}, {&(0x7f0000000540)="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", 0xfa}], 0x3, &(0x7f0000000680)=[@authinfo={0x10, 0x84, 0x6, {0x6}}], 0x10, 0x40}, 0x52050) ioctl$KVM_RUN(r3, 0xae80, 0x0) 18:22:36 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x23f, 0x0) 18:22:36 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c9, 0x0) 18:22:36 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1e0, 0x0) 18:22:36 executing program 4 (fault-call:0 fault-nth:53): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:22:36 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x21a, 0x0) [ 1181.753125][T29920] FAULT_INJECTION: forcing a failure. [ 1181.753125][T29920] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1181.766823][T29920] CPU: 0 PID: 29920 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1181.774906][T29920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1181.785244][T29920] Call Trace: [ 1181.788557][T29920] dump_stack+0x197/0x210 [ 1181.792915][T29920] should_fail.cold+0xa/0x15 [ 1181.797555][T29920] ? fault_create_debugfs_attr+0x180/0x180 [ 1181.803472][T29920] ? __kasan_check_read+0x11/0x20 [ 1181.808609][T29920] ? __lock_acquire+0x16f2/0x4a00 [ 1181.813653][T29920] ? stack_trace_consume_entry+0x190/0x190 [ 1181.819487][T29920] should_fail_alloc_page+0x50/0x60 [ 1181.824796][T29920] __alloc_pages_nodemask+0x1a1/0x900 [ 1181.830191][T29920] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1181.836015][T29920] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1181.841875][T29920] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1181.847540][T29920] ? fault_create_debugfs_attr+0x180/0x180 [ 1181.853460][T29920] cache_grow_begin+0x90/0xd20 [ 1181.858354][T29920] ? getname_flags+0xd6/0x5b0 [ 1181.863042][T29920] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1181.869433][T29920] kmem_cache_alloc+0x64e/0x710 [ 1181.874350][T29920] getname_flags+0xd6/0x5b0 [ 1181.878886][T29920] user_path_at_empty+0x2f/0x50 [ 1181.883865][T29920] do_mount+0x150/0x1b60 [ 1181.888307][T29920] ? copy_mount_string+0x40/0x40 [ 1181.893273][T29920] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1181.899539][T29920] ? copy_mount_options+0x2e8/0x3f0 [ 1181.904973][T29920] ksys_mount+0xdb/0x150 [ 1181.909242][T29920] __x64_sys_mount+0xbe/0x150 [ 1181.914037][T29920] do_syscall_64+0xfa/0x760 [ 1181.918570][T29920] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1181.924569][T29920] RIP: 0033:0x45d08a [ 1181.928593][T29920] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 18:22:36 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x240, 0x0) [ 1181.949338][T29920] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1181.957774][T29920] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a [ 1181.965903][T29920] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1181.973976][T29920] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1181.982126][T29920] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1181.990133][T29920] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:22:37 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ca, 0x0) 18:22:37 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1e1, 0x0) [ 1182.127060][T29920] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:22:37 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x21b, 0x0) 18:22:37 executing program 4 (fault-call:0 fault-nth:54): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:22:37 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2cb, 0x0) [ 1182.385570][T29954] FAULT_INJECTION: forcing a failure. [ 1182.385570][T29954] name failslab, interval 1, probability 0, space 0, times 0 [ 1182.480665][T29954] CPU: 1 PID: 29954 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1182.489056][T29954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1182.500992][T29954] Call Trace: [ 1182.504647][T29954] dump_stack+0x197/0x210 [ 1182.509140][T29954] should_fail.cold+0xa/0x15 [ 1182.514341][T29954] ? fault_create_debugfs_attr+0x180/0x180 [ 1182.520186][T29954] ? ___might_sleep+0x163/0x2c0 [ 1182.525065][T29954] __should_failslab+0x121/0x190 [ 1182.530109][T29954] should_failslab+0x9/0x14 [ 1182.534745][T29954] __kmalloc+0x2e0/0x770 [ 1182.539137][T29954] ? __kmalloc+0x608/0x770 [ 1182.543746][T29954] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1182.549482][T29954] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1182.555044][T29954] tomoyo_mount_acl+0x149/0x840 [ 1182.559928][T29954] ? __kasan_check_read+0x11/0x20 [ 1182.565146][T29954] ? mark_lock+0xc2/0x1220 [ 1182.569752][T29954] ? lock_downgrade+0x920/0x920 [ 1182.574617][T29954] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1182.580184][T29954] ? __kasan_check_read+0x11/0x20 [ 1182.585228][T29954] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1182.591421][T29954] ? lock_acquire+0x190/0x410 [ 1182.596324][T29954] ? tomoyo_mount_permission+0x10a/0x410 [ 1182.602169][T29954] tomoyo_mount_permission+0x16a/0x410 [ 1182.607731][T29954] ? tomoyo_mount_permission+0x10a/0x410 [ 1182.613379][T29954] ? tomoyo_mount_acl+0x840/0x840 [ 1182.618596][T29954] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1182.624947][T29954] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1182.631435][T29954] ? strncpy_from_user+0x2b4/0x400 [ 1182.636856][T29954] tomoyo_sb_mount+0x35/0x40 [ 1182.641633][T29954] security_sb_mount+0x87/0xd0 [ 1182.646508][T29954] do_mount+0x1d4/0x1b60 [ 1182.650779][T29954] ? copy_mount_string+0x40/0x40 [ 1182.655902][T29954] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1182.662509][T29954] ? copy_mount_options+0x2e8/0x3f0 [ 1182.667736][T29954] ksys_mount+0xdb/0x150 [ 1182.672104][T29954] __x64_sys_mount+0xbe/0x150 [ 1182.676929][T29954] do_syscall_64+0xfa/0x760 [ 1182.681623][T29954] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1182.687623][T29954] RIP: 0033:0x45d08a [ 1182.691555][T29954] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1182.711630][T29954] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1182.711646][T29954] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a [ 1182.711654][T29954] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1182.711662][T29954] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1182.711670][T29954] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1182.711685][T29954] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 [ 1182.804109][T29954] ERROR: Out of memory at tomoyo_realpath_from_path. 18:22:41 executing program 2: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x79, 0x0, 0x0) 18:22:41 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1e2, 0x0) 18:22:41 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x21c, 0x0) 18:22:41 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x241, 0x0) 18:22:41 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2cc, 0x0) 18:22:41 executing program 4 (fault-call:0 fault-nth:55): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1186.816911][T29978] FAULT_INJECTION: forcing a failure. [ 1186.816911][T29978] name failslab, interval 1, probability 0, space 0, times 0 18:22:41 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x242, 0x0) [ 1186.886398][T29978] CPU: 0 PID: 29978 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1186.894341][T29978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1186.904404][T29978] Call Trace: [ 1186.907721][T29978] dump_stack+0x197/0x210 [ 1186.912076][T29978] should_fail.cold+0xa/0x15 [ 1186.916690][T29978] ? fault_create_debugfs_attr+0x180/0x180 [ 1186.922507][T29978] ? ___might_sleep+0x163/0x2c0 [ 1186.927406][T29978] __should_failslab+0x121/0x190 [ 1186.927424][T29978] should_failslab+0x9/0x14 [ 1186.927436][T29978] __kmalloc+0x2e0/0x770 [ 1186.927449][T29978] ? kmem_cache_alloc+0x364/0x710 [ 1186.927467][T29978] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1186.927484][T29978] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1186.927508][T29978] tomoyo_mount_acl+0x2cc/0x840 [ 1186.962348][T29978] ? mark_lock+0xc2/0x1220 [ 1186.966880][T29978] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1186.972443][T29978] ? __kasan_check_read+0x11/0x20 [ 1186.977481][T29978] ? rcu_lockdep_current_cpu_online+0xe3/0x130 18:22:41 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2cd, 0x0) [ 1186.983658][T29978] ? lock_acquire+0x190/0x410 [ 1186.988357][T29978] ? tomoyo_mount_permission+0x10a/0x410 [ 1186.993998][T29978] tomoyo_mount_permission+0x16a/0x410 [ 1186.999458][T29978] ? tomoyo_mount_permission+0x10a/0x410 [ 1187.005097][T29978] ? tomoyo_mount_acl+0x840/0x840 [ 1187.010130][T29978] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1187.010154][T29978] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1187.010175][T29978] ? strncpy_from_user+0x2b4/0x400 [ 1187.027826][T29978] tomoyo_sb_mount+0x35/0x40 [ 1187.032423][T29978] security_sb_mount+0x87/0xd0 [ 1187.037205][T29978] do_mount+0x1d4/0x1b60 [ 1187.041532][T29978] ? copy_mount_string+0x40/0x40 [ 1187.046489][T29978] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1187.052736][T29978] ? copy_mount_options+0x2e8/0x3f0 [ 1187.052755][T29978] ksys_mount+0xdb/0x150 [ 1187.052773][T29978] __x64_sys_mount+0xbe/0x150 [ 1187.066854][T29978] do_syscall_64+0xfa/0x760 [ 1187.071369][T29978] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1187.077263][T29978] RIP: 0033:0x45d08a 18:22:42 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x243, 0x0) [ 1187.081162][T29978] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1187.101725][T29978] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1187.110166][T29978] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a [ 1187.118144][T29978] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1187.126118][T29978] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 18:22:42 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1e3, 0x0) [ 1187.134321][T29978] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1187.142296][T29978] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:22:42 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x21d, 0x0) 18:22:42 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ce, 0x0) [ 1187.273652][T29978] ERROR: Out of memory at tomoyo_realpath_from_path. 18:22:51 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x4, &(0x7f0000000040)=[{&(0x7f0000000140)="1400000013000507ed0064d24ef862453858c653", 0x14}], 0x1}, 0x0) 18:22:51 executing program 4 (fault-call:0 fault-nth:56): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:22:51 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1e4, 0x0) 18:22:51 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2cf, 0x0) 18:22:51 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x244, 0x0) 18:22:51 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x21e, 0x0) [ 1196.138835][T30037] FAULT_INJECTION: forcing a failure. [ 1196.138835][T30037] name failslab, interval 1, probability 0, space 0, times 0 18:22:51 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d0, 0x0) [ 1196.179445][T30037] CPU: 0 PID: 30037 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1196.187416][T30037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1196.197593][T30037] Call Trace: [ 1196.200901][T30037] dump_stack+0x197/0x210 [ 1196.205294][T30037] should_fail.cold+0xa/0x15 [ 1196.209988][T30037] ? fault_create_debugfs_attr+0x180/0x180 [ 1196.215813][T30037] ? ___might_sleep+0x163/0x2c0 [ 1196.220796][T30037] __should_failslab+0x121/0x190 [ 1196.225747][T30037] should_failslab+0x9/0x14 [ 1196.230252][T30037] kmem_cache_alloc_trace+0x2d3/0x790 [ 1196.235747][T30037] alloc_fs_context+0x5a/0x780 [ 1196.240522][T30037] fs_context_for_mount+0x25/0x30 [ 1196.245568][T30037] do_mount+0x11bc/0x1b60 [ 1196.249917][T30037] ? copy_mount_string+0x40/0x40 [ 1196.254863][T30037] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1196.261114][T30037] ? copy_mount_options+0x2e8/0x3f0 [ 1196.266325][T30037] ksys_mount+0xdb/0x150 [ 1196.270592][T30037] __x64_sys_mount+0xbe/0x150 [ 1196.275278][T30037] do_syscall_64+0xfa/0x760 [ 1196.279785][T30037] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1196.285677][T30037] RIP: 0033:0x45d08a [ 1196.289576][T30037] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1196.309461][T30037] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1196.317889][T30037] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a 18:22:51 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1e5, 0x0) [ 1196.325874][T30037] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1196.333856][T30037] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1196.341838][T30037] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1196.349818][T30037] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:22:51 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x245, 0x0) 18:22:51 executing program 4 (fault-call:0 fault-nth:57): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:22:51 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d1, 0x0) 18:22:51 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x21f, 0x0) [ 1196.720851][T30062] FAULT_INJECTION: forcing a failure. [ 1196.720851][T30062] name failslab, interval 1, probability 0, space 0, times 0 [ 1196.763622][T30062] CPU: 1 PID: 30062 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1196.771655][T30062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1196.781718][T30062] Call Trace: [ 1196.785031][T30062] dump_stack+0x197/0x210 [ 1196.789383][T30062] should_fail.cold+0xa/0x15 [ 1196.794010][T30062] ? fault_create_debugfs_attr+0x180/0x180 [ 1196.799835][T30062] ? ___might_sleep+0x163/0x2c0 [ 1196.804712][T30062] __should_failslab+0x121/0x190 [ 1196.809640][T30062] should_failslab+0x9/0x14 [ 1196.814124][T30062] __kmalloc+0x2e0/0x770 [ 1196.818351][T30062] ? lockdep_init_map+0x1be/0x6d0 [ 1196.823564][T30062] ? prealloc_shrinker+0xa6/0x350 [ 1196.828598][T30062] prealloc_shrinker+0xa6/0x350 [ 1196.833464][T30062] alloc_super+0x77a/0x910 [ 1196.837875][T30062] ? test_bdev_super_fc+0x80/0x80 [ 1196.842892][T30062] sget+0x117/0x560 [ 1196.846689][T30062] ? kill_litter_super+0x60/0x60 [ 1196.851619][T30062] mount_bdev+0xff/0x3c0 [ 1196.855870][T30062] ? ext4_calculate_overhead+0x1250/0x1250 [ 1196.861690][T30062] ext4_mount+0x35/0x40 [ 1196.865838][T30062] ? ext4_nfs_get_inode+0xe0/0xe0 [ 1196.870860][T30062] legacy_get_tree+0x108/0x220 [ 1196.875620][T30062] vfs_get_tree+0x8e/0x300 [ 1196.880024][T30062] do_mount+0x1369/0x1b60 [ 1196.884340][T30062] ? retint_kernel+0x2b/0x2b [ 1196.889283][T30062] ? copy_mount_string+0x40/0x40 [ 1196.894208][T30062] ? copy_mount_options+0xb2/0x3f0 [ 1196.899310][T30062] ? audit_add_tree_rule.cold+0x37/0x37 [ 1196.904844][T30062] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1196.911072][T30062] ? copy_mount_options+0x2e8/0x3f0 [ 1196.916262][T30062] ksys_mount+0xdb/0x150 [ 1196.920594][T30062] __x64_sys_mount+0xbe/0x150 [ 1196.925262][T30062] do_syscall_64+0xfa/0x760 [ 1196.929756][T30062] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1196.935634][T30062] RIP: 0033:0x45d08a [ 1196.939602][T30062] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1196.959192][T30062] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1196.967823][T30062] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a [ 1196.975981][T30062] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1196.983937][T30062] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1196.991892][T30062] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1196.999846][T30062] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:22:58 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400c00) 18:22:58 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1e6, 0x0) 18:22:58 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d2, 0x0) 18:22:58 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x246, 0x0) 18:22:58 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x220, 0x0) 18:22:58 executing program 4 (fault-call:0 fault-nth:58): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1203.445128][T30088] FAULT_INJECTION: forcing a failure. [ 1203.445128][T30088] name failslab, interval 1, probability 0, space 0, times 0 [ 1203.559853][T30088] CPU: 1 PID: 30088 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1203.567802][T30088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1203.577871][T30088] Call Trace: [ 1203.581178][T30088] dump_stack+0x197/0x210 [ 1203.585534][T30088] should_fail.cold+0xa/0x15 [ 1203.590151][T30088] ? fault_create_debugfs_attr+0x180/0x180 [ 1203.595977][T30088] ? ___might_sleep+0x163/0x2c0 [ 1203.600839][T30088] __should_failslab+0x121/0x190 [ 1203.605812][T30088] should_failslab+0x9/0x14 [ 1203.610323][T30088] kmem_cache_alloc_trace+0x2d3/0x790 [ 1203.615718][T30088] ? lockdep_init_map+0x1be/0x6d0 [ 1203.620776][T30088] legacy_init_fs_context+0x48/0xe0 [ 1203.625996][T30088] ? generic_parse_monolithic+0x200/0x200 [ 1203.631720][T30088] alloc_fs_context+0x46e/0x780 [ 1203.636592][T30088] fs_context_for_mount+0x25/0x30 [ 1203.641621][T30088] do_mount+0x11bc/0x1b60 [ 1203.645956][T30088] ? copy_mount_string+0x40/0x40 [ 1203.651010][T30088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1203.657255][T30088] ? copy_mount_options+0x2e8/0x3f0 [ 1203.662455][T30088] ksys_mount+0xdb/0x150 [ 1203.666700][T30088] __x64_sys_mount+0xbe/0x150 [ 1203.671381][T30088] do_syscall_64+0xfa/0x760 [ 1203.675890][T30088] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1203.681799][T30088] RIP: 0033:0x45d08a [ 1203.685698][T30088] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 18:22:58 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d3, 0x0) [ 1203.705397][T30088] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1203.713817][T30088] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a [ 1203.721795][T30088] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1203.729782][T30088] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1203.737759][T30088] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1203.745739][T30088] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:22:58 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1e7, 0x0) 18:22:58 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x247, 0x0) 18:22:58 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d4, 0x0) 18:22:59 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1e8, 0x0) 18:22:59 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x221, 0x0) 18:23:07 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400c00) 18:23:07 executing program 4 (fault-call:0 fault-nth:59): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:23:07 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x248, 0x0) 18:23:07 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1e9, 0x0) 18:23:07 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d5, 0x0) 18:23:07 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x222, 0x0) 18:23:08 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d6, 0x0) [ 1212.996613][T30142] FAULT_INJECTION: forcing a failure. [ 1212.996613][T30142] name failslab, interval 1, probability 0, space 0, times 0 [ 1213.155372][T30142] CPU: 1 PID: 30142 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1213.163332][T30142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1213.173397][T30142] Call Trace: [ 1213.176703][T30142] dump_stack+0x197/0x210 [ 1213.181049][T30142] should_fail.cold+0xa/0x15 [ 1213.185659][T30142] ? fault_create_debugfs_attr+0x180/0x180 [ 1213.191481][T30142] ? ___might_sleep+0x163/0x2c0 [ 1213.197127][T30142] __should_failslab+0x121/0x190 [ 1213.202091][T30142] should_failslab+0x9/0x14 [ 1213.206702][T30142] __kmalloc+0x2e0/0x770 [ 1213.210950][T30142] ? kmem_cache_alloc+0x364/0x710 [ 1213.215980][T30142] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1213.221709][T30142] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1213.227267][T30142] tomoyo_mount_acl+0x2cc/0x840 [ 1213.232312][T30142] ? mark_lock+0xc2/0x1220 [ 1213.236736][T30142] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1213.242285][T30142] ? __kasan_check_read+0x11/0x20 [ 1213.247317][T30142] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1213.253496][T30142] ? lock_acquire+0x190/0x410 [ 1213.258208][T30142] ? tomoyo_mount_permission+0x10a/0x410 [ 1213.263863][T30142] tomoyo_mount_permission+0x16a/0x410 [ 1213.269334][T30142] ? tomoyo_mount_permission+0x10a/0x410 [ 1213.274972][T30142] ? tomoyo_mount_acl+0x840/0x840 [ 1213.280007][T30142] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1213.286270][T30142] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1213.292515][T30142] ? strncpy_from_user+0x2b4/0x400 [ 1213.297635][T30142] tomoyo_sb_mount+0x35/0x40 [ 1213.302243][T30142] security_sb_mount+0x87/0xd0 [ 1213.307022][T30142] do_mount+0x1d4/0x1b60 [ 1213.311278][T30142] ? copy_mount_string+0x40/0x40 [ 1213.316250][T30142] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1213.322550][T30142] ? copy_mount_options+0x2e8/0x3f0 [ 1213.327845][T30142] ksys_mount+0xdb/0x150 [ 1213.332119][T30142] __x64_sys_mount+0xbe/0x150 [ 1213.336824][T30142] do_syscall_64+0xfa/0x760 [ 1213.341336][T30142] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1213.347233][T30142] RIP: 0033:0x45d08a 18:23:08 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1ea, 0x0) 18:23:08 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x249, 0x0) [ 1213.351127][T30142] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1213.370734][T30142] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1213.370750][T30142] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a [ 1213.370757][T30142] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1213.370765][T30142] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 18:23:08 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d7, 0x0) [ 1213.370772][T30142] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1213.370779][T30142] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 [ 1213.516046][T30142] ERROR: Out of memory at tomoyo_realpath_from_path. 18:23:08 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x223, 0x0) 18:23:08 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x24a, 0x0) 18:23:17 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400c00) 18:23:17 executing program 4 (fault-call:0 fault-nth:60): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:23:17 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1eb, 0x0) 18:23:17 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d8, 0x0) 18:23:17 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x24b, 0x0) 18:23:17 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x224, 0x0) [ 1222.230965][T30187] FAULT_INJECTION: forcing a failure. [ 1222.230965][T30187] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1222.244362][T30187] CPU: 1 PID: 30187 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1222.252262][T30187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1222.252274][T30187] Call Trace: [ 1222.265627][T30187] dump_stack+0x197/0x210 [ 1222.269970][T30187] should_fail.cold+0xa/0x15 [ 1222.274595][T30187] ? fault_create_debugfs_attr+0x180/0x180 [ 1222.280419][T30187] ? __kasan_check_read+0x11/0x20 [ 1222.285448][T30187] ? __lock_acquire+0x16f2/0x4a00 [ 1222.290486][T30187] should_fail_alloc_page+0x50/0x60 [ 1222.295689][T30187] __alloc_pages_nodemask+0x1a1/0x900 [ 1222.301066][T30187] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1222.306709][T30187] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1222.312433][T30187] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1222.318082][T30187] ? fault_create_debugfs_attr+0x180/0x180 [ 1222.323901][T30187] cache_grow_begin+0x90/0xd20 [ 1222.328783][T30187] ? getname_kernel+0x53/0x370 [ 1222.333546][T30187] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1222.333563][T30187] kmem_cache_alloc+0x64e/0x710 [ 1222.333581][T30187] ? debug_smp_processor_id+0x3c/0x214 [ 1222.350130][T30187] getname_kernel+0x53/0x370 [ 1222.354735][T30187] kern_path+0x20/0x40 [ 1222.358813][T30187] lookup_bdev.part.0+0x7b/0x1b0 [ 1222.363757][T30187] ? blkdev_open+0x290/0x290 [ 1222.368360][T30187] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1222.374362][T30187] ? __lookup_constant+0xd6/0x100 [ 1222.379412][T30187] blkdev_get_by_path+0x81/0x130 [ 1222.384394][T30187] mount_bdev+0x5d/0x3c0 [ 1222.388642][T30187] ? ext4_calculate_overhead+0x1250/0x1250 [ 1222.394455][T30187] ext4_mount+0x35/0x40 [ 1222.398616][T30187] ? ext4_nfs_get_inode+0xe0/0xe0 [ 1222.403850][T30187] legacy_get_tree+0x108/0x220 [ 1222.408712][T30187] vfs_get_tree+0x8e/0x300 [ 1222.413134][T30187] do_mount+0x1369/0x1b60 [ 1222.417477][T30187] ? copy_mount_string+0x40/0x40 [ 1222.422427][T30187] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1222.428670][T30187] ? copy_mount_options+0x2e8/0x3f0 [ 1222.433874][T30187] ksys_mount+0xdb/0x150 [ 1222.438123][T30187] __x64_sys_mount+0xbe/0x150 [ 1222.442808][T30187] do_syscall_64+0xfa/0x760 [ 1222.447318][T30187] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1222.453297][T30187] RIP: 0033:0x45d08a [ 1222.457194][T30187] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1222.476802][T30187] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1222.485308][T30187] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a [ 1222.493282][T30187] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1222.501258][T30187] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1222.509231][T30187] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1222.517355][T30187] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:23:17 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d9, 0x0) 18:23:17 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x225, 0x0) 18:23:17 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1ec, 0x0) [ 1222.680973][T30187] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:23:17 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x24c, 0x0) 18:23:17 executing program 4 (fault-call:0 fault-nth:61): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:23:17 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2da, 0x0) [ 1223.147510][T30224] FAULT_INJECTION: forcing a failure. [ 1223.147510][T30224] name failslab, interval 1, probability 0, space 0, times 0 [ 1223.166393][T30224] CPU: 0 PID: 30224 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1223.174440][T30224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1223.184500][T30224] Call Trace: [ 1223.187799][T30224] dump_stack+0x197/0x210 [ 1223.192131][T30224] should_fail.cold+0xa/0x15 [ 1223.196733][T30224] ? fault_create_debugfs_attr+0x180/0x180 [ 1223.202555][T30224] ? ___might_sleep+0x163/0x2c0 [ 1223.207418][T30224] __should_failslab+0x121/0x190 [ 1223.212374][T30224] should_failslab+0x9/0x14 [ 1223.216889][T30224] __kmalloc_track_caller+0x2dc/0x760 [ 1223.222442][T30224] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1223.227996][T30224] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1223.233991][T30224] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1223.239806][T30224] ? vfs_parse_fs_string+0xe8/0x170 [ 1223.246582][T30224] kmemdup_nul+0x31/0xa0 [ 1223.250847][T30224] vfs_parse_fs_string+0xe8/0x170 [ 1223.255872][T30224] ? vfs_parse_fs_param+0x540/0x540 [ 1223.261166][T30224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1223.267416][T30224] ? alloc_fs_context+0x4bf/0x780 [ 1223.272442][T30224] do_mount+0x6b4/0x1b60 [ 1223.276694][T30224] ? copy_mount_string+0x40/0x40 [ 1223.281690][T30224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1223.288056][T30224] ? copy_mount_options+0x2e8/0x3f0 [ 1223.295000][T30224] ksys_mount+0xdb/0x150 [ 1223.299256][T30224] __x64_sys_mount+0xbe/0x150 [ 1223.303946][T30224] do_syscall_64+0xfa/0x760 [ 1223.308456][T30224] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1223.314360][T30224] RIP: 0033:0x45d08a [ 1223.318261][T30224] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1223.338101][T30224] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1223.346567][T30224] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a [ 1223.354555][T30224] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1223.362512][T30224] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1223.370597][T30224] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1223.378558][T30224] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:23:23 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xbc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) io_setup(0x75, &(0x7f0000000240)=0x0) io_submit(r2, 0x0, 0x0) 18:23:23 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1ed, 0x0) 18:23:23 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x24d, 0x0) 18:23:23 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2db, 0x0) 18:23:23 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x226, 0x0) 18:23:23 executing program 4 (fault-call:0 fault-nth:62): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1228.617601][T30245] FAULT_INJECTION: forcing a failure. [ 1228.617601][T30245] name failslab, interval 1, probability 0, space 0, times 0 [ 1228.684722][T30245] CPU: 1 PID: 30245 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1228.692670][T30245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1228.702736][T30245] Call Trace: [ 1228.706043][T30245] dump_stack+0x197/0x210 [ 1228.710394][T30245] should_fail.cold+0xa/0x15 [ 1228.715000][T30245] ? fault_create_debugfs_attr+0x180/0x180 [ 1228.720825][T30245] ? ___might_sleep+0x163/0x2c0 [ 1228.725687][T30245] __should_failslab+0x121/0x190 [ 1228.730629][T30245] should_failslab+0x9/0x14 [ 1228.735129][T30245] __kmalloc_track_caller+0x2dc/0x760 [ 1228.740498][T30245] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1228.746043][T30245] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1228.752025][T30245] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1228.757837][T30245] ? vfs_parse_fs_string+0xe8/0x170 [ 1228.763052][T30245] kmemdup_nul+0x31/0xa0 [ 1228.767304][T30245] vfs_parse_fs_string+0xe8/0x170 [ 1228.772335][T30245] ? vfs_parse_fs_param+0x540/0x540 [ 1228.777539][T30245] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1228.783777][T30245] ? alloc_fs_context+0x4bf/0x780 [ 1228.788814][T30245] do_mount+0x6b4/0x1b60 [ 1228.793066][T30245] ? copy_mount_string+0x40/0x40 [ 1228.798016][T30245] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1228.804243][T30245] ? copy_mount_options+0x2e8/0x3f0 [ 1228.809428][T30245] ksys_mount+0xdb/0x150 [ 1228.813658][T30245] __x64_sys_mount+0xbe/0x150 [ 1228.818343][T30245] do_syscall_64+0xfa/0x760 [ 1228.822833][T30245] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1228.828704][T30245] RIP: 0033:0x45d08a [ 1228.832581][T30245] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1228.852254][T30245] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1228.860647][T30245] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a [ 1228.868599][T30245] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1228.876554][T30245] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1228.884508][T30245] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1228.892468][T30245] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:23:23 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2dc, 0x0) 18:23:23 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x227, 0x0) 18:23:23 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1ee, 0x0) 18:23:23 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x24e, 0x0) 18:23:24 executing program 4 (fault-call:0 fault-nth:63): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:23:24 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2dd, 0x0) [ 1229.293977][T30274] FAULT_INJECTION: forcing a failure. [ 1229.293977][T30274] name failslab, interval 1, probability 0, space 0, times 0 [ 1229.433546][T30274] CPU: 1 PID: 30274 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1229.441490][T30274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1229.451560][T30274] Call Trace: [ 1229.454859][T30274] dump_stack+0x197/0x210 [ 1229.459202][T30274] should_fail.cold+0xa/0x15 [ 1229.463805][T30274] ? fault_create_debugfs_attr+0x180/0x180 [ 1229.469624][T30274] ? ___might_sleep+0x163/0x2c0 [ 1229.474494][T30274] __should_failslab+0x121/0x190 [ 1229.479447][T30274] should_failslab+0x9/0x14 [ 1229.483953][T30274] kmem_cache_alloc_trace+0x2d3/0x790 [ 1229.489347][T30274] alloc_fs_context+0x5a/0x780 [ 1229.494156][T30274] fs_context_for_mount+0x25/0x30 [ 1229.499187][T30274] do_mount+0x11bc/0x1b60 [ 1229.503527][T30274] ? copy_mount_string+0x40/0x40 [ 1229.508477][T30274] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1229.514718][T30274] ? copy_mount_options+0x2e8/0x3f0 [ 1229.519915][T30274] ksys_mount+0xdb/0x150 [ 1229.524188][T30274] __x64_sys_mount+0xbe/0x150 [ 1229.528873][T30274] do_syscall_64+0xfa/0x760 [ 1229.533373][T30274] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1229.539267][T30274] RIP: 0033:0x45d08a [ 1229.539282][T30274] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1229.539289][T30274] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1229.539303][T30274] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a [ 1229.539311][T30274] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1229.539320][T30274] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1229.539327][T30274] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1229.539341][T30274] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 [ 1234.869992][ T26] audit: type=1804 audit(1573928609.829:37): pid=30289 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir214212032/syzkaller.TyX7hj/566/bus" dev="sda1" ino=16561 res=1 [ 1234.938461][ T26] audit: type=1804 audit(1573928609.899:38): pid=30289 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir214212032/syzkaller.TyX7hj/566/bus" dev="sda1" ino=16561 res=1 18:23:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xbc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) io_setup(0x75, &(0x7f0000000240)=0x0) io_submit(r2, 0x0, 0x0) 18:23:30 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x24f, 0x0) 18:23:30 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x228, 0x0) 18:23:30 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1ef, 0x0) 18:23:30 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2de, 0x0) 18:23:30 executing program 4 (fault-call:0 fault-nth:64): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1235.176077][T30298] FAULT_INJECTION: forcing a failure. [ 1235.176077][T30298] name failslab, interval 1, probability 0, space 0, times 0 [ 1235.250128][T30298] CPU: 1 PID: 30298 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1235.258076][T30298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1235.268139][T30298] Call Trace: [ 1235.271448][T30298] dump_stack+0x197/0x210 [ 1235.275792][T30298] should_fail.cold+0xa/0x15 [ 1235.280392][T30298] ? fault_create_debugfs_attr+0x180/0x180 [ 1235.286211][T30298] ? ___might_sleep+0x163/0x2c0 [ 1235.291068][T30298] __should_failslab+0x121/0x190 [ 1235.296017][T30298] should_failslab+0x9/0x14 [ 1235.300520][T30298] kmem_cache_alloc_trace+0x2d3/0x790 [ 1235.305896][T30298] ? lockdep_init_map+0x1be/0x6d0 [ 1235.310932][T30298] legacy_init_fs_context+0x48/0xe0 [ 1235.316132][T30298] ? generic_parse_monolithic+0x200/0x200 [ 1235.321851][T30298] alloc_fs_context+0x46e/0x780 [ 1235.326710][T30298] fs_context_for_mount+0x25/0x30 [ 1235.331737][T30298] do_mount+0x11bc/0x1b60 [ 1235.336070][T30298] ? copy_mount_string+0x40/0x40 [ 1235.341013][T30298] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1235.347252][T30298] ? copy_mount_options+0x2e8/0x3f0 [ 1235.352458][T30298] ksys_mount+0xdb/0x150 [ 1235.356705][T30298] __x64_sys_mount+0xbe/0x150 [ 1235.361384][T30298] do_syscall_64+0xfa/0x760 [ 1235.365921][T30298] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1235.371813][T30298] RIP: 0033:0x45d08a [ 1235.375710][T30298] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 18:23:30 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x229, 0x0) 18:23:30 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1f0, 0x0) [ 1235.395432][T30298] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1235.403855][T30298] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a [ 1235.411835][T30298] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1235.419812][T30298] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1235.427788][T30298] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1235.435768][T30298] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:23:30 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x250, 0x0) 18:23:30 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2df, 0x0) 18:23:30 executing program 4 (fault-call:0 fault-nth:65): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:23:30 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1f1, 0x0) [ 1235.803523][T30325] FAULT_INJECTION: forcing a failure. [ 1235.803523][T30325] name failslab, interval 1, probability 0, space 0, times 0 [ 1235.856870][T30325] CPU: 0 PID: 30325 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1235.864925][T30325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1235.875083][T30325] Call Trace: [ 1235.878384][T30325] dump_stack+0x197/0x210 [ 1235.882729][T30325] should_fail.cold+0xa/0x15 [ 1235.887335][T30325] ? fault_create_debugfs_attr+0x180/0x180 [ 1235.893149][T30325] ? ___might_sleep+0x163/0x2c0 [ 1235.898006][T30325] __should_failslab+0x121/0x190 [ 1235.902945][T30325] should_failslab+0x9/0x14 [ 1235.907477][T30325] kmem_cache_alloc_node_trace+0x274/0x750 [ 1235.913284][T30325] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1235.919112][T30325] __kmalloc_node+0x3d/0x70 [ 1235.923624][T30325] kvmalloc_node+0x68/0x100 [ 1235.928133][T30325] __list_lru_init+0x4d5/0x710 [ 1235.933018][T30325] alloc_super+0x7cc/0x910 [ 1235.937437][T30325] ? test_bdev_super_fc+0x80/0x80 [ 1235.942457][T30325] sget+0x117/0x560 [ 1235.946270][T30325] ? kill_litter_super+0x60/0x60 [ 1235.951207][T30325] mount_bdev+0xff/0x3c0 [ 1235.955448][T30325] ? ext4_calculate_overhead+0x1250/0x1250 [ 1235.961267][T30325] ext4_mount+0x35/0x40 [ 1235.965431][T30325] ? ext4_nfs_get_inode+0xe0/0xe0 [ 1235.970475][T30325] legacy_get_tree+0x108/0x220 [ 1235.975251][T30325] vfs_get_tree+0x8e/0x300 [ 1235.979732][T30325] do_mount+0x1369/0x1b60 [ 1235.984075][T30325] ? copy_mount_string+0x40/0x40 [ 1235.989025][T30325] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1235.995275][T30325] ? copy_mount_options+0x2e8/0x3f0 [ 1236.000483][T30325] ksys_mount+0xdb/0x150 [ 1236.004732][T30325] __x64_sys_mount+0xbe/0x150 [ 1236.009421][T30325] do_syscall_64+0xfa/0x760 [ 1236.013936][T30325] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1236.019832][T30325] RIP: 0033:0x45d08a [ 1236.023728][T30325] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1236.043336][T30325] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1236.051819][T30325] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a [ 1236.059979][T30325] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1236.067956][T30325] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1236.075937][T30325] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1236.084022][T30325] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:23:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xbc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) io_setup(0x75, &(0x7f0000000240)=0x0) io_submit(r2, 0x0, 0x0) 18:23:37 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1f2, 0x0) 18:23:37 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x22a, 0x0) 18:23:37 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2e0, 0x0) 18:23:37 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x251, 0x0) 18:23:37 executing program 4 (fault-call:0 fault-nth:66): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1242.350221][T30347] FAULT_INJECTION: forcing a failure. [ 1242.350221][T30347] name failslab, interval 1, probability 0, space 0, times 0 [ 1242.410183][T30347] CPU: 0 PID: 30347 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1242.418121][T30347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1242.428183][T30347] Call Trace: [ 1242.431484][T30347] dump_stack+0x197/0x210 [ 1242.435831][T30347] should_fail.cold+0xa/0x15 [ 1242.440439][T30347] ? fault_create_debugfs_attr+0x180/0x180 [ 1242.446261][T30347] ? ___might_sleep+0x163/0x2c0 [ 1242.451134][T30347] __should_failslab+0x121/0x190 [ 1242.456082][T30347] should_failslab+0x9/0x14 18:23:37 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2e1, 0x0) [ 1242.460593][T30347] kmem_cache_alloc_trace+0x2d3/0x790 [ 1242.465971][T30347] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1242.471905][T30347] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1242.477630][T30347] __list_lru_init+0x3fe/0x710 [ 1242.482608][T30347] alloc_super+0x7cc/0x910 [ 1242.487034][T30347] ? test_bdev_super_fc+0x80/0x80 [ 1242.492062][T30347] sget+0x117/0x560 [ 1242.495975][T30347] ? kill_litter_super+0x60/0x60 [ 1242.500918][T30347] mount_bdev+0xff/0x3c0 [ 1242.505167][T30347] ? ext4_calculate_overhead+0x1250/0x1250 [ 1242.510988][T30347] ext4_mount+0x35/0x40 [ 1242.515150][T30347] ? ext4_nfs_get_inode+0xe0/0xe0 [ 1242.515166][T30347] legacy_get_tree+0x108/0x220 [ 1242.515185][T30347] vfs_get_tree+0x8e/0x300 [ 1242.515200][T30347] do_mount+0x1369/0x1b60 [ 1242.515221][T30347] ? copy_mount_string+0x40/0x40 [ 1242.533698][T30347] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1242.533718][T30347] ? copy_mount_options+0x2e8/0x3f0 [ 1242.550060][T30347] ksys_mount+0xdb/0x150 [ 1242.554315][T30347] __x64_sys_mount+0xbe/0x150 [ 1242.559003][T30347] do_syscall_64+0xfa/0x760 [ 1242.563515][T30347] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1242.569412][T30347] RIP: 0033:0x45d08a [ 1242.573311][T30347] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1242.593006][T30347] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1242.601428][T30347] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a 18:23:37 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1f3, 0x0) 18:23:37 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x252, 0x0) 18:23:37 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x22b, 0x0) [ 1242.609497][T30347] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1242.617497][T30347] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1242.625535][T30347] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1242.633511][T30347] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:23:37 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2e2, 0x0) 18:23:37 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1f4, 0x0) 18:23:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xbc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) io_setup(0x75, &(0x7f0000000240)=0x0) io_submit(r2, 0x0, 0x0) 18:23:42 executing program 4 (fault-call:0 fault-nth:67): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:23:42 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x253, 0x0) 18:23:42 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2e3, 0x0) 18:23:42 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x22c, 0x0) 18:23:42 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1f5, 0x0) [ 1247.447536][T30398] FAULT_INJECTION: forcing a failure. [ 1247.447536][T30398] name failslab, interval 1, probability 0, space 0, times 0 [ 1247.494518][T30398] CPU: 1 PID: 30398 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1247.502470][T30398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1247.512654][T30398] Call Trace: [ 1247.515963][T30398] dump_stack+0x197/0x210 [ 1247.520314][T30398] should_fail.cold+0xa/0x15 [ 1247.524931][T30398] ? fault_create_debugfs_attr+0x180/0x180 [ 1247.530750][T30398] ? ___might_sleep+0x163/0x2c0 [ 1247.535620][T30398] __should_failslab+0x121/0x190 [ 1247.540728][T30398] should_failslab+0x9/0x14 [ 1247.545248][T30398] kmem_cache_alloc_trace+0x2d3/0x790 [ 1247.550636][T30398] ? lock_downgrade+0x920/0x920 [ 1247.555495][T30398] ? rwlock_bug.part.0+0x90/0x90 [ 1247.560545][T30398] alloc_super+0x55/0x910 [ 1247.564882][T30398] ? test_bdev_super_fc+0x80/0x80 [ 1247.569918][T30398] sget+0x117/0x560 [ 1247.573734][T30398] ? kill_litter_super+0x60/0x60 [ 1247.578679][T30398] mount_bdev+0xff/0x3c0 [ 1247.582923][T30398] ? ext4_calculate_overhead+0x1250/0x1250 [ 1247.588743][T30398] ext4_mount+0x35/0x40 [ 1247.592903][T30398] ? ext4_nfs_get_inode+0xe0/0xe0 [ 1247.597928][T30398] legacy_get_tree+0x108/0x220 [ 1247.602696][T30398] vfs_get_tree+0x8e/0x300 [ 1247.607118][T30398] do_mount+0x1369/0x1b60 [ 1247.611458][T30398] ? copy_mount_string+0x40/0x40 [ 1247.616401][T30398] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1247.622641][T30398] ? copy_mount_options+0x2e8/0x3f0 [ 1247.627844][T30398] ksys_mount+0xdb/0x150 [ 1247.632093][T30398] __x64_sys_mount+0xbe/0x150 [ 1247.636787][T30398] do_syscall_64+0xfa/0x760 [ 1247.641300][T30398] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1247.647196][T30398] RIP: 0033:0x45d08a [ 1247.651094][T30398] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1247.670703][T30398] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1247.679233][T30398] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a [ 1247.687213][T30398] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1247.695188][T30398] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1247.703161][T30398] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1247.711138][T30398] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:23:42 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x254, 0x0) 18:23:42 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2e4, 0x0) 18:23:42 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x22d, 0x0) 18:23:42 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1f6, 0x0) 18:23:42 executing program 4 (fault-call:0 fault-nth:68): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:23:43 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2e5, 0x0) [ 1248.164223][T30425] FAULT_INJECTION: forcing a failure. [ 1248.164223][T30425] name failslab, interval 1, probability 0, space 0, times 0 [ 1248.212418][T30425] CPU: 1 PID: 30425 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1248.221506][T30425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1248.231575][T30425] Call Trace: [ 1248.234876][T30425] dump_stack+0x197/0x210 [ 1248.239227][T30425] should_fail.cold+0xa/0x15 [ 1248.243834][T30425] ? fault_create_debugfs_attr+0x180/0x180 [ 1248.249658][T30425] ? ___might_sleep+0x163/0x2c0 [ 1248.254522][T30425] __should_failslab+0x121/0x190 [ 1248.259464][T30425] should_failslab+0x9/0x14 [ 1248.263973][T30425] __kmalloc+0x2e0/0x770 [ 1248.268226][T30425] ? lockdep_init_map+0x1be/0x6d0 [ 1248.273255][T30425] ? prealloc_shrinker+0xa6/0x350 [ 1248.278283][T30425] prealloc_shrinker+0xa6/0x350 [ 1248.283141][T30425] alloc_super+0x77a/0x910 [ 1248.287559][T30425] ? test_bdev_super_fc+0x80/0x80 [ 1248.292585][T30425] sget+0x117/0x560 [ 1248.296393][T30425] ? kill_litter_super+0x60/0x60 [ 1248.301335][T30425] mount_bdev+0xff/0x3c0 [ 1248.305580][T30425] ? ext4_calculate_overhead+0x1250/0x1250 [ 1248.311410][T30425] ext4_mount+0x35/0x40 [ 1248.315567][T30425] ? ext4_nfs_get_inode+0xe0/0xe0 [ 1248.320616][T30425] legacy_get_tree+0x108/0x220 [ 1248.325390][T30425] vfs_get_tree+0x8e/0x300 [ 1248.329814][T30425] do_mount+0x1369/0x1b60 [ 1248.334155][T30425] ? copy_mount_string+0x40/0x40 [ 1248.339101][T30425] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1248.345344][T30425] ? copy_mount_options+0x2e8/0x3f0 [ 1248.350551][T30425] ksys_mount+0xdb/0x150 [ 1248.354803][T30425] __x64_sys_mount+0xbe/0x150 [ 1248.359489][T30425] do_syscall_64+0xfa/0x760 [ 1248.364077][T30425] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1248.370125][T30425] RIP: 0033:0x45d08a [ 1248.374025][T30425] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1248.393827][T30425] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1248.402245][T30425] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a [ 1248.410401][T30425] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1248.418387][T30425] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1248.426360][T30425] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1248.434365][T30425] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:23:49 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x22e, 0x0) 18:23:49 executing program 2: ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f0000000640)={0x1c00000000000000, 0x0, 0x5, 0x4, 0x9}) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f00000000c0)={0x2, 0x1000, 0x81, 0xffff, 0x2, 0x3}) fcntl$getflags(r0, 0xb) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000005c0)={0xc}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x10000000000004}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r2, &(0x7f0000005fc0), 0xa9, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000680)) openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 18:23:49 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x255, 0x0) 18:23:49 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1f7, 0x0) 18:23:49 executing program 4 (fault-call:0 fault-nth:69): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:23:49 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2e6, 0x0) [ 1254.692501][T30448] FAULT_INJECTION: forcing a failure. [ 1254.692501][T30448] name failslab, interval 1, probability 0, space 0, times 0 [ 1254.820675][T30448] CPU: 1 PID: 30448 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1254.828629][T30448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1254.838710][T30448] Call Trace: [ 1254.842009][T30448] dump_stack+0x197/0x210 [ 1254.846353][T30448] should_fail.cold+0xa/0x15 [ 1254.850958][T30448] ? fault_create_debugfs_attr+0x180/0x180 [ 1254.856775][T30448] ? ___might_sleep+0x163/0x2c0 [ 1254.861651][T30448] __should_failslab+0x121/0x190 [ 1254.866634][T30448] should_failslab+0x9/0x14 [ 1254.871141][T30448] __kmalloc+0x2e0/0x770 [ 1254.875395][T30448] ? lockdep_init_map+0x1be/0x6d0 [ 1254.880423][T30448] ? prealloc_shrinker+0xa6/0x350 [ 1254.885456][T30448] prealloc_shrinker+0xa6/0x350 [ 1254.890316][T30448] alloc_super+0x77a/0x910 [ 1254.894732][T30448] ? test_bdev_super_fc+0x80/0x80 [ 1254.894764][T30448] sget+0x117/0x560 [ 1254.903650][T30448] ? kill_litter_super+0x60/0x60 [ 1254.908604][T30448] mount_bdev+0xff/0x3c0 [ 1254.912850][T30448] ? ext4_calculate_overhead+0x1250/0x1250 [ 1254.918671][T30448] ext4_mount+0x35/0x40 [ 1254.922831][T30448] ? ext4_nfs_get_inode+0xe0/0xe0 [ 1254.927862][T30448] legacy_get_tree+0x108/0x220 [ 1254.932641][T30448] vfs_get_tree+0x8e/0x300 [ 1254.937096][T30448] do_mount+0x1369/0x1b60 [ 1254.941443][T30448] ? copy_mount_string+0x40/0x40 [ 1254.946399][T30448] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1254.952819][T30448] ? copy_mount_options+0x2e8/0x3f0 [ 1254.958112][T30448] ksys_mount+0xdb/0x150 [ 1254.962360][T30448] __x64_sys_mount+0xbe/0x150 [ 1254.967042][T30448] do_syscall_64+0xfa/0x760 18:23:49 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2e7, 0x0) 18:23:49 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x256, 0x0) [ 1254.971555][T30448] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1254.977462][T30448] RIP: 0033:0x45d08a [ 1254.981361][T30448] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1255.001066][T30448] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1255.001080][T30448] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a 18:23:50 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1f8, 0x0) [ 1255.001088][T30448] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1255.001096][T30448] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1255.001104][T30448] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1255.001112][T30448] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:23:50 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x22f, 0x0) 18:23:50 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2e8, 0x0) 18:23:50 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x257, 0x0) 18:23:50 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1f9, 0x0) 18:23:58 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000600)='/dev/cec#\x00', 0x2, 0x2) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000640)={0x0, 0x0, 0x5}) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x8840) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x10000000000004}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r2, &(0x7f0000005fc0), 0xa9, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000680)) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 18:23:58 executing program 4 (fault-call:0 fault-nth:70): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:23:58 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x258, 0x0) 18:23:58 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2e9, 0x0) 18:23:58 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1fa, 0x0) 18:23:58 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x230, 0x0) [ 1263.994943][T30507] FAULT_INJECTION: forcing a failure. [ 1263.994943][T30507] name failslab, interval 1, probability 0, space 0, times 0 [ 1264.072479][T30507] CPU: 1 PID: 30507 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1264.080426][T30507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1264.090500][T30507] Call Trace: [ 1264.093821][T30507] dump_stack+0x197/0x210 [ 1264.098167][T30507] should_fail.cold+0xa/0x15 [ 1264.102767][T30507] ? fault_create_debugfs_attr+0x180/0x180 [ 1264.108586][T30507] ? ___might_sleep+0x163/0x2c0 [ 1264.113447][T30507] __should_failslab+0x121/0x190 [ 1264.118393][T30507] should_failslab+0x9/0x14 [ 1264.122894][T30507] __kmalloc+0x2e0/0x770 [ 1264.127141][T30507] ? __list_lru_init+0xd1/0x710 [ 1264.132000][T30507] __list_lru_init+0xd1/0x710 [ 1264.136715][T30507] alloc_super+0x7cc/0x910 [ 1264.141137][T30507] ? test_bdev_super_fc+0x80/0x80 [ 1264.146175][T30507] sget+0x117/0x560 [ 1264.149983][T30507] ? kill_litter_super+0x60/0x60 [ 1264.154923][T30507] mount_bdev+0xff/0x3c0 [ 1264.159167][T30507] ? ext4_calculate_overhead+0x1250/0x1250 [ 1264.164983][T30507] ext4_mount+0x35/0x40 [ 1264.169169][T30507] ? ext4_nfs_get_inode+0xe0/0xe0 [ 1264.174199][T30507] legacy_get_tree+0x108/0x220 [ 1264.178975][T30507] vfs_get_tree+0x8e/0x300 [ 1264.183397][T30507] do_mount+0x1369/0x1b60 [ 1264.187735][T30507] ? copy_mount_string+0x40/0x40 [ 1264.192682][T30507] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1264.198926][T30507] ? copy_mount_options+0x2e8/0x3f0 [ 1264.204137][T30507] ksys_mount+0xdb/0x150 [ 1264.208387][T30507] __x64_sys_mount+0xbe/0x150 [ 1264.213078][T30507] do_syscall_64+0xfa/0x760 [ 1264.217589][T30507] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1264.223477][T30507] RIP: 0033:0x45d08a [ 1264.227381][T30507] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1264.246987][T30507] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1264.255490][T30507] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a [ 1264.263472][T30507] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 18:23:59 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x231, 0x0) 18:23:59 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1fb, 0x0) 18:23:59 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x259, 0x0) [ 1264.271456][T30507] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1264.279457][T30507] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1264.287448][T30507] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:23:59 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ea, 0x0) 18:23:59 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x25a, 0x0) 18:23:59 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2eb, 0x0) 18:24:08 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1fc, 0x0) 18:24:08 executing program 4 (fault-call:0 fault-nth:71): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:24:08 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x232, 0x0) 18:24:08 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ec, 0x0) 18:24:08 executing program 2: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80000) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e80)=""/51, 0x33}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = getpid() get_robust_list(r4, &(0x7f0000000380)=0x0, &(0x7f00000003c0)) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) shmget$private(0x0, 0x13000, 0x0, &(0x7f0000feb000/0x13000)=nil) io_setup(0x3, &(0x7f00000001c0)) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) 18:24:08 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x25b, 0x0) [ 1273.352138][T30560] FAULT_INJECTION: forcing a failure. [ 1273.352138][T30560] name failslab, interval 1, probability 0, space 0, times 0 [ 1273.373915][T30560] CPU: 0 PID: 30560 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1273.381858][T30560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1273.391947][T30560] Call Trace: [ 1273.395249][T30560] dump_stack+0x197/0x210 [ 1273.399599][T30560] should_fail.cold+0xa/0x15 [ 1273.404342][T30560] ? fault_create_debugfs_attr+0x180/0x180 [ 1273.410165][T30560] ? ___might_sleep+0x163/0x2c0 [ 1273.415029][T30560] __should_failslab+0x121/0x190 [ 1273.419982][T30560] should_failslab+0x9/0x14 [ 1273.424494][T30560] kmem_cache_alloc_trace+0x2d3/0x790 [ 1273.429877][T30560] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1273.435705][T30560] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1273.441346][T30560] __list_lru_init+0x3fe/0x710 [ 1273.446124][T30560] alloc_super+0x7cc/0x910 [ 1273.450542][T30560] ? test_bdev_super_fc+0x80/0x80 [ 1273.455581][T30560] sget+0x117/0x560 [ 1273.459403][T30560] ? kill_litter_super+0x60/0x60 [ 1273.464349][T30560] mount_bdev+0xff/0x3c0 [ 1273.468611][T30560] ? ext4_calculate_overhead+0x1250/0x1250 [ 1273.474428][T30560] ext4_mount+0x35/0x40 [ 1273.478598][T30560] ? ext4_nfs_get_inode+0xe0/0xe0 [ 1273.483634][T30560] legacy_get_tree+0x108/0x220 [ 1273.488412][T30560] vfs_get_tree+0x8e/0x300 [ 1273.492841][T30560] do_mount+0x1369/0x1b60 [ 1273.497185][T30560] ? copy_mount_string+0x40/0x40 18:24:08 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1fd, 0x0) 18:24:08 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x25c, 0x0) [ 1273.502125][T30560] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1273.508384][T30560] ? _copy_from_user+0x12c/0x1a0 [ 1273.513329][T30560] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1273.520373][T30560] ? copy_mount_options+0x2e8/0x3f0 [ 1273.525592][T30560] ksys_mount+0xdb/0x150 [ 1273.529841][T30560] __x64_sys_mount+0xbe/0x150 [ 1273.534522][T30560] do_syscall_64+0xfa/0x760 [ 1273.539031][T30560] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1273.544922][T30560] RIP: 0033:0x45d08a [ 1273.544939][T30560] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1273.544947][T30560] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1273.568435][T30560] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a [ 1273.568443][T30560] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1273.568450][T30560] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 18:24:08 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ed, 0x0) [ 1273.568457][T30560] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1273.568464][T30560] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:24:08 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x233, 0x0) 18:24:08 executing program 4 (fault-call:0 fault-nth:72): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:24:08 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ee, 0x0) 18:24:09 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) [ 1274.008053][T30587] FAULT_INJECTION: forcing a failure. [ 1274.008053][T30587] name failslab, interval 1, probability 0, space 0, times 0 [ 1274.074498][T30587] CPU: 0 PID: 30587 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1274.082452][T30587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1274.092520][T30587] Call Trace: [ 1274.095824][T30587] dump_stack+0x197/0x210 [ 1274.100166][T30587] should_fail.cold+0xa/0x15 [ 1274.104776][T30587] ? fault_create_debugfs_attr+0x180/0x180 [ 1274.110682][T30587] ? ___might_sleep+0x163/0x2c0 [ 1274.115546][T30587] __should_failslab+0x121/0x190 [ 1274.120489][T30587] should_failslab+0x9/0x14 [ 1274.125207][T30587] kmem_cache_alloc_trace+0x2d3/0x790 [ 1274.130601][T30587] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1274.136419][T30587] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1274.142162][T30587] __list_lru_init+0x3fe/0x710 [ 1274.146960][T30587] alloc_super+0x7cc/0x910 [ 1274.151381][T30587] ? test_bdev_super_fc+0x80/0x80 [ 1274.156427][T30587] sget+0x117/0x560 [ 1274.160242][T30587] ? kill_litter_super+0x60/0x60 [ 1274.165182][T30587] mount_bdev+0xff/0x3c0 [ 1274.169426][T30587] ? ext4_calculate_overhead+0x1250/0x1250 [ 1274.175237][T30587] ext4_mount+0x35/0x40 [ 1274.179405][T30587] ? ext4_nfs_get_inode+0xe0/0xe0 [ 1274.184630][T30587] legacy_get_tree+0x108/0x220 [ 1274.189407][T30587] vfs_get_tree+0x8e/0x300 [ 1274.193837][T30587] do_mount+0x1369/0x1b60 [ 1274.198181][T30587] ? copy_mount_string+0x40/0x40 [ 1274.203137][T30587] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1274.209390][T30587] ? copy_mount_options+0x2e8/0x3f0 [ 1274.214594][T30587] ksys_mount+0xdb/0x150 [ 1274.218840][T30587] __x64_sys_mount+0xbe/0x150 [ 1274.223527][T30587] do_syscall_64+0xfa/0x760 [ 1274.228044][T30587] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1274.234066][T30587] RIP: 0033:0x45d08a [ 1274.237974][T30587] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1274.257583][T30587] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1274.265994][T30587] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a 18:24:09 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x201, 0x0) 18:24:09 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x234, 0x0) 18:24:09 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ef, 0x0) [ 1274.273998][T30587] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1274.281975][T30587] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1274.289953][T30587] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1274.298068][T30587] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:24:17 executing program 2: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="62020207e0000001"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) r1 = socket(0x2, 0x2, 0x0) dup2(r0, r1) connect$unix(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x10) r2 = socket(0x2, 0x8002, 0x0) connect$unix(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="62020207e00000681600"], 0x10) write(r2, 0x0, 0x0) 18:24:17 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x25d, 0x0) 18:24:17 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x202, 0x0) 18:24:17 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2f0, 0x0) 18:24:17 executing program 4 (fault-call:0 fault-nth:73): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:24:17 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x235, 0x0) [ 1282.738822][T30625] FAULT_INJECTION: forcing a failure. [ 1282.738822][T30625] name failslab, interval 1, probability 0, space 0, times 0 [ 1282.840454][T30625] CPU: 0 PID: 30625 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1282.848471][T30625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1282.858548][T30625] Call Trace: [ 1282.861860][T30625] dump_stack+0x197/0x210 [ 1282.866235][T30625] should_fail.cold+0xa/0x15 [ 1282.870874][T30625] ? fault_create_debugfs_attr+0x180/0x180 [ 1282.876698][T30625] ? ___might_sleep+0x163/0x2c0 [ 1282.881571][T30625] __should_failslab+0x121/0x190 [ 1282.886515][T30625] should_failslab+0x9/0x14 [ 1282.891032][T30625] kmem_cache_alloc_trace+0x2d3/0x790 [ 1282.896762][T30625] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1282.902691][T30625] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1282.908334][T30625] __list_lru_init+0x3fe/0x710 [ 1282.913111][T30625] alloc_super+0x7cc/0x910 [ 1282.917542][T30625] ? test_bdev_super_fc+0x80/0x80 [ 1282.922572][T30625] sget+0x117/0x560 [ 1282.926385][T30625] ? kill_litter_super+0x60/0x60 [ 1282.931333][T30625] mount_bdev+0xff/0x3c0 [ 1282.935591][T30625] ? ext4_calculate_overhead+0x1250/0x1250 [ 1282.941417][T30625] ext4_mount+0x35/0x40 [ 1282.945586][T30625] ? ext4_nfs_get_inode+0xe0/0xe0 [ 1282.950615][T30625] legacy_get_tree+0x108/0x220 [ 1282.955390][T30625] vfs_get_tree+0x8e/0x300 [ 1282.959818][T30625] do_mount+0x1369/0x1b60 [ 1282.964186][T30625] ? copy_mount_string+0x40/0x40 [ 1282.969141][T30625] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1282.975397][T30625] ? copy_mount_options+0x2e8/0x3f0 [ 1282.980606][T30625] ksys_mount+0xdb/0x150 [ 1282.984860][T30625] __x64_sys_mount+0xbe/0x150 [ 1282.989550][T30625] do_syscall_64+0xfa/0x760 [ 1282.994059][T30625] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1283.000046][T30625] RIP: 0033:0x45d08a [ 1283.003946][T30625] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1283.023567][T30625] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1283.032005][T30625] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a 18:24:18 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2f1, 0x0) 18:24:18 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x203, 0x0) 18:24:18 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x25e, 0x0) [ 1283.039994][T30625] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1283.047980][T30625] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1283.055969][T30625] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1283.063956][T30625] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:24:18 executing program 4 (fault-call:0 fault-nth:74): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:24:18 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x236, 0x0) [ 1283.340774][T30650] FAULT_INJECTION: forcing a failure. [ 1283.340774][T30650] name failslab, interval 1, probability 0, space 0, times 0 [ 1283.404707][T30650] CPU: 0 PID: 30650 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1283.412688][T30650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1283.422749][T30650] Call Trace: [ 1283.426174][T30650] dump_stack+0x197/0x210 [ 1283.430540][T30650] should_fail.cold+0xa/0x15 [ 1283.435147][T30650] ? fault_create_debugfs_attr+0x180/0x180 [ 1283.440959][T30650] ? ___might_sleep+0x163/0x2c0 [ 1283.445825][T30650] __should_failslab+0x121/0x190 18:24:18 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2f2, 0x0) [ 1283.450783][T30650] should_failslab+0x9/0x14 [ 1283.455296][T30650] kmem_cache_alloc_trace+0x2d3/0x790 [ 1283.460672][T30650] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1283.466492][T30650] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1283.472134][T30650] __list_lru_init+0x3fe/0x710 [ 1283.476909][T30650] alloc_super+0x7cc/0x910 [ 1283.481327][T30650] ? test_bdev_super_fc+0x80/0x80 [ 1283.486357][T30650] sget+0x117/0x560 [ 1283.490174][T30650] ? kill_litter_super+0x60/0x60 [ 1283.495127][T30650] mount_bdev+0xff/0x3c0 [ 1283.499566][T30650] ? ext4_calculate_overhead+0x1250/0x1250 [ 1283.505385][T30650] ext4_mount+0x35/0x40 [ 1283.509566][T30650] ? ext4_nfs_get_inode+0xe0/0xe0 [ 1283.514594][T30650] legacy_get_tree+0x108/0x220 [ 1283.519364][T30650] vfs_get_tree+0x8e/0x300 [ 1283.523819][T30650] do_mount+0x1369/0x1b60 [ 1283.528185][T30650] ? copy_mount_string+0x40/0x40 [ 1283.533138][T30650] ? copy_mount_options+0x258/0x3f0 [ 1283.538338][T30650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1283.544580][T30650] ? copy_mount_options+0x2e8/0x3f0 [ 1283.549792][T30650] ksys_mount+0xdb/0x150 [ 1283.554161][T30650] __x64_sys_mount+0xbe/0x150 [ 1283.558845][T30650] do_syscall_64+0xfa/0x760 [ 1283.563353][T30650] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1283.569241][T30650] RIP: 0033:0x45d08a [ 1283.573136][T30650] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1283.592736][T30650] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1283.601173][T30650] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a [ 1283.609149][T30650] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1283.617124][T30650] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1283.625180][T30650] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1283.633148][T30650] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:24:26 executing program 2: clone(0x0, 0x0, 0x0, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) 18:24:26 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x25f, 0x0) 18:24:26 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x204, 0x0) 18:24:26 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2f3, 0x0) 18:24:26 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x237, 0x0) 18:24:26 executing program 4 (fault-call:0 fault-nth:75): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1292.029028][T30681] FAULT_INJECTION: forcing a failure. [ 1292.029028][T30681] name failslab, interval 1, probability 0, space 0, times 0 [ 1292.115532][T30681] CPU: 1 PID: 30681 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1292.123482][T30681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1292.133547][T30681] Call Trace: [ 1292.136952][T30681] dump_stack+0x197/0x210 [ 1292.141298][T30681] should_fail.cold+0xa/0x15 [ 1292.145906][T30681] ? fault_create_debugfs_attr+0x180/0x180 [ 1292.151730][T30681] ? ___might_sleep+0x163/0x2c0 [ 1292.156596][T30681] __should_failslab+0x121/0x190 [ 1292.161538][T30681] should_failslab+0x9/0x14 [ 1292.166137][T30681] kmem_cache_alloc_trace+0x2d3/0x790 [ 1292.171522][T30681] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1292.177343][T30681] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1292.182994][T30681] __list_lru_init+0x3fe/0x710 [ 1292.187779][T30681] alloc_super+0x7cc/0x910 [ 1292.192205][T30681] ? test_bdev_super_fc+0x80/0x80 [ 1292.197678][T30681] sget+0x117/0x560 [ 1292.201489][T30681] ? kill_litter_super+0x60/0x60 [ 1292.206432][T30681] mount_bdev+0xff/0x3c0 [ 1292.210690][T30681] ? ext4_calculate_overhead+0x1250/0x1250 [ 1292.216506][T30681] ext4_mount+0x35/0x40 [ 1292.220670][T30681] ? ext4_nfs_get_inode+0xe0/0xe0 [ 1292.225694][T30681] legacy_get_tree+0x108/0x220 [ 1292.230464][T30681] vfs_get_tree+0x8e/0x300 [ 1292.234889][T30681] do_mount+0x1369/0x1b60 [ 1292.239376][T30681] ? copy_mount_string+0x40/0x40 [ 1292.244329][T30681] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1292.250582][T30681] ? _copy_from_user+0x12c/0x1a0 [ 1292.255529][T30681] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1292.261775][T30681] ? copy_mount_options+0x2e8/0x3f0 [ 1292.266981][T30681] ksys_mount+0xdb/0x150 [ 1292.271240][T30681] __x64_sys_mount+0xbe/0x150 [ 1292.275932][T30681] do_syscall_64+0xfa/0x760 [ 1292.280446][T30681] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1292.286339][T30681] RIP: 0033:0x45d08a [ 1292.290241][T30681] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 18:24:27 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x260, 0x0) [ 1292.310722][T30681] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1292.319148][T30681] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a [ 1292.327133][T30681] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1292.335115][T30681] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1292.343089][T30681] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1292.351069][T30681] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:24:27 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2f4, 0x0) 18:24:27 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x205, 0x0) 18:24:27 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x238, 0x0) 18:24:27 executing program 4 (fault-call:0 fault-nth:76): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:24:27 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2f5, 0x0) [ 1292.683562][T30712] FAULT_INJECTION: forcing a failure. [ 1292.683562][T30712] name failslab, interval 1, probability 0, space 0, times 0 [ 1292.782168][T30712] CPU: 0 PID: 30712 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1292.790120][T30712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1292.802207][T30712] Call Trace: [ 1292.805539][T30712] dump_stack+0x197/0x210 [ 1292.809886][T30712] should_fail.cold+0xa/0x15 [ 1292.814497][T30712] ? fault_create_debugfs_attr+0x180/0x180 [ 1292.820310][T30712] ? ___might_sleep+0x163/0x2c0 [ 1292.825170][T30712] __should_failslab+0x121/0x190 [ 1292.830117][T30712] should_failslab+0x9/0x14 [ 1292.834619][T30712] kmem_cache_alloc_trace+0x2d3/0x790 [ 1292.839991][T30712] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1292.845813][T30712] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1292.851483][T30712] __list_lru_init+0x3fe/0x710 [ 1292.856253][T30712] alloc_super+0x7cc/0x910 [ 1292.860673][T30712] ? test_bdev_super_fc+0x80/0x80 [ 1292.865705][T30712] sget+0x117/0x560 [ 1292.869510][T30712] ? kill_litter_super+0x60/0x60 [ 1292.874458][T30712] mount_bdev+0xff/0x3c0 [ 1292.878715][T30712] ? ext4_calculate_overhead+0x1250/0x1250 [ 1292.884538][T30712] ext4_mount+0x35/0x40 [ 1292.888711][T30712] ? ext4_nfs_get_inode+0xe0/0xe0 [ 1292.893767][T30712] legacy_get_tree+0x108/0x220 [ 1292.898707][T30712] vfs_get_tree+0x8e/0x300 [ 1292.903120][T30712] do_mount+0x1369/0x1b60 [ 1292.907448][T30712] ? copy_mount_string+0x40/0x40 [ 1292.912373][T30712] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1292.918609][T30712] ? _copy_from_user+0x12c/0x1a0 [ 1292.923537][T30712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1292.929774][T30712] ? copy_mount_options+0x2e8/0x3f0 [ 1292.934989][T30712] ksys_mount+0xdb/0x150 [ 1292.939235][T30712] __x64_sys_mount+0xbe/0x150 [ 1292.943901][T30712] do_syscall_64+0xfa/0x760 [ 1292.948408][T30712] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1292.954298][T30712] RIP: 0033:0x45d08a [ 1292.958194][T30712] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1292.977793][T30712] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1292.986199][T30712] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a [ 1292.994200][T30712] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1293.002162][T30712] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1293.010127][T30712] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1293.018104][T30712] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:24:34 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="00003639408fa3a3ba27660199783b0a82f79b32a7c8225086600a38e07d4db88a66596759e95307b680ab73e03d53555c97e8e37d01da4d44a994354aea4de6e1430c8f59b8db4bc132649fa3f355214eeabd24dd620b2022d5ad63b369aaffe900b608a5fece0eca95d71f2d3e60613a027fb50cbcbd92940076d3b97247e066002314da52d04ea8c924cd48d6225ccf1032f51d36ab231f6c20d87e91eed2f2db4734535e0293b467edf69776dca67d90a15dcd18fb9cff00000078e382dcf296a23a060b816ef873ec854b8f54b55d8b33442037fb348b4067ffb88ba83804368b5b44df52ea0400000000000000ff9b90b861f6f9cb2b079d0d3ff4e469d02400000000", 0x106}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) 18:24:34 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x261, 0x0) 18:24:34 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x206, 0x0) 18:24:34 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x239, 0x0) 18:24:34 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2f6, 0x0) 18:24:34 executing program 4 (fault-call:0 fault-nth:77): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1299.208624][T30746] FAULT_INJECTION: forcing a failure. [ 1299.208624][T30746] name failslab, interval 1, probability 0, space 0, times 0 [ 1299.254792][T30746] CPU: 0 PID: 30746 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1299.262761][T30746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1299.272830][T30746] Call Trace: [ 1299.276146][T30746] dump_stack+0x197/0x210 [ 1299.280491][T30746] should_fail.cold+0xa/0x15 [ 1299.285105][T30746] ? fault_create_debugfs_attr+0x180/0x180 [ 1299.290934][T30746] ? ___might_sleep+0x163/0x2c0 [ 1299.295885][T30746] __should_failslab+0x121/0x190 [ 1299.300829][T30746] should_failslab+0x9/0x14 [ 1299.305336][T30746] kmem_cache_alloc_trace+0x2d3/0x790 [ 1299.310918][T30746] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1299.316757][T30746] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1299.322408][T30746] __list_lru_init+0x3fe/0x710 [ 1299.327191][T30746] alloc_super+0x7cc/0x910 [ 1299.331883][T30746] ? test_bdev_super_fc+0x80/0x80 [ 1299.336918][T30746] sget+0x117/0x560 [ 1299.340837][T30746] ? kill_litter_super+0x60/0x60 [ 1299.345790][T30746] mount_bdev+0xff/0x3c0 [ 1299.350037][T30746] ? ext4_calculate_overhead+0x1250/0x1250 [ 1299.355869][T30746] ext4_mount+0x35/0x40 [ 1299.360026][T30746] ? ext4_nfs_get_inode+0xe0/0xe0 [ 1299.365055][T30746] legacy_get_tree+0x108/0x220 [ 1299.370012][T30746] vfs_get_tree+0x8e/0x300 [ 1299.374439][T30746] do_mount+0x1369/0x1b60 [ 1299.378783][T30746] ? copy_mount_string+0x40/0x40 [ 1299.383736][T30746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1299.389980][T30746] ? copy_mount_options+0x2e8/0x3f0 [ 1299.395189][T30746] ksys_mount+0xdb/0x150 [ 1299.399441][T30746] __x64_sys_mount+0xbe/0x150 [ 1299.404123][T30746] do_syscall_64+0xfa/0x760 [ 1299.408635][T30746] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1299.414619][T30746] RIP: 0033:0x45d08a [ 1299.418516][T30746] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1299.438130][T30746] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1299.446639][T30746] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a 18:24:34 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x207, 0x0) 18:24:34 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2f7, 0x0) [ 1299.454627][T30746] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1299.462718][T30746] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1299.470697][T30746] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1299.478670][T30746] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:24:34 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x23a, 0x0) 18:24:34 executing program 4 (fault-call:0 fault-nth:78): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:24:34 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x208, 0x0) 18:24:34 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2f8, 0x0) [ 1299.867418][T30770] FAULT_INJECTION: forcing a failure. [ 1299.867418][T30770] name failslab, interval 1, probability 0, space 0, times 0 [ 1299.975074][T30770] CPU: 0 PID: 30770 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1299.983028][T30770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1299.993103][T30770] Call Trace: [ 1299.996405][T30770] dump_stack+0x197/0x210 [ 1300.000754][T30770] should_fail.cold+0xa/0x15 [ 1300.005445][T30770] ? fault_create_debugfs_attr+0x180/0x180 [ 1300.011266][T30770] ? ___might_sleep+0x163/0x2c0 [ 1300.016126][T30770] __should_failslab+0x121/0x190 [ 1300.021071][T30770] should_failslab+0x9/0x14 [ 1300.025697][T30770] kmem_cache_alloc_trace+0x2d3/0x790 [ 1300.031078][T30770] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1300.036901][T30770] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1300.042546][T30770] __list_lru_init+0x3fe/0x710 [ 1300.047367][T30770] alloc_super+0x7cc/0x910 [ 1300.051795][T30770] ? test_bdev_super_fc+0x80/0x80 [ 1300.056830][T30770] sget+0x117/0x560 [ 1300.060638][T30770] ? kill_litter_super+0x60/0x60 [ 1300.065582][T30770] mount_bdev+0xff/0x3c0 [ 1300.069824][T30770] ? ext4_calculate_overhead+0x1250/0x1250 [ 1300.075646][T30770] ext4_mount+0x35/0x40 [ 1300.079813][T30770] ? ext4_nfs_get_inode+0xe0/0xe0 [ 1300.084838][T30770] legacy_get_tree+0x108/0x220 [ 1300.089609][T30770] vfs_get_tree+0x8e/0x300 [ 1300.094146][T30770] do_mount+0x1369/0x1b60 [ 1300.098493][T30770] ? copy_mount_string+0x40/0x40 [ 1300.103445][T30770] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1300.109705][T30770] ? copy_mount_options+0x2e8/0x3f0 [ 1300.114918][T30770] ksys_mount+0xdb/0x150 [ 1300.119166][T30770] __x64_sys_mount+0xbe/0x150 [ 1300.123854][T30770] do_syscall_64+0xfa/0x760 [ 1300.128359][T30770] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1300.134361][T30770] RIP: 0033:0x45d08a [ 1300.138417][T30770] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1300.158124][T30770] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1300.166554][T30770] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a [ 1300.174564][T30770] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1300.182679][T30770] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1300.190662][T30770] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1300.198645][T30770] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:24:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000003a40)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 18:24:41 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x209, 0x0) 18:24:41 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x23b, 0x0) 18:24:41 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2f9, 0x0) 18:24:41 executing program 4 (fault-call:0 fault-nth:79): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:24:41 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x262, 0x0) [ 1306.409986][T30801] FAULT_INJECTION: forcing a failure. [ 1306.409986][T30801] name failslab, interval 1, probability 0, space 0, times 0 [ 1306.462111][T30801] CPU: 1 PID: 30801 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1306.470058][T30801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1306.480139][T30801] Call Trace: [ 1306.483436][T30801] dump_stack+0x197/0x210 [ 1306.487782][T30801] should_fail.cold+0xa/0x15 [ 1306.492388][T30801] ? fault_create_debugfs_attr+0x180/0x180 [ 1306.498204][T30801] ? ___might_sleep+0x163/0x2c0 [ 1306.503061][T30801] __should_failslab+0x121/0x190 [ 1306.508058][T30801] should_failslab+0x9/0x14 [ 1306.512563][T30801] kmem_cache_alloc_trace+0x2d3/0x790 [ 1306.517935][T30801] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1306.523884][T30801] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1306.529519][T30801] __list_lru_init+0x3fe/0x710 [ 1306.534315][T30801] alloc_super+0x7cc/0x910 [ 1306.538738][T30801] ? test_bdev_super_fc+0x80/0x80 [ 1306.543763][T30801] sget+0x117/0x560 [ 1306.547567][T30801] ? kill_litter_super+0x60/0x60 [ 1306.552511][T30801] mount_bdev+0xff/0x3c0 [ 1306.556757][T30801] ? ext4_calculate_overhead+0x1250/0x1250 [ 1306.562566][T30801] ext4_mount+0x35/0x40 [ 1306.566727][T30801] ? ext4_nfs_get_inode+0xe0/0xe0 [ 1306.571749][T30801] legacy_get_tree+0x108/0x220 [ 1306.576518][T30801] vfs_get_tree+0x8e/0x300 [ 1306.580958][T30801] do_mount+0x1369/0x1b60 [ 1306.585298][T30801] ? copy_mount_string+0x40/0x40 [ 1306.590245][T30801] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1306.596495][T30801] ? copy_mount_options+0x2e8/0x3f0 [ 1306.601702][T30801] ksys_mount+0xdb/0x150 [ 1306.605955][T30801] __x64_sys_mount+0xbe/0x150 [ 1306.610630][T30801] do_syscall_64+0xfa/0x760 [ 1306.615142][T30801] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1306.621032][T30801] RIP: 0033:0x45d08a [ 1306.624930][T30801] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1306.644545][T30801] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1306.653120][T30801] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a 18:24:41 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x263, 0x0) [ 1306.661213][T30801] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1306.669277][T30801] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1306.677267][T30801] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1306.677275][T30801] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:24:41 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2fa, 0x0) 18:24:41 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x20a, 0x0) 18:24:41 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x23c, 0x0) 18:24:41 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x264, 0x0) 18:24:41 executing program 4 (fault-call:0 fault-nth:80): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1307.178954][T30835] FAULT_INJECTION: forcing a failure. [ 1307.178954][T30835] name failslab, interval 1, probability 0, space 0, times 0 [ 1307.297351][T30835] CPU: 1 PID: 30835 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1307.305302][T30835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1307.315366][T30835] Call Trace: [ 1307.318663][T30835] dump_stack+0x197/0x210 [ 1307.322992][T30835] should_fail.cold+0xa/0x15 [ 1307.327582][T30835] ? fault_create_debugfs_attr+0x180/0x180 [ 1307.333405][T30835] ? ___might_sleep+0x163/0x2c0 [ 1307.338246][T30835] __should_failslab+0x121/0x190 [ 1307.343172][T30835] should_failslab+0x9/0x14 [ 1307.347666][T30835] kmem_cache_alloc_trace+0x2d3/0x790 [ 1307.353033][T30835] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1307.358653][T30835] __list_lru_init+0x3fe/0x710 [ 1307.363405][T30835] alloc_super+0x7cc/0x910 [ 1307.367826][T30835] ? test_bdev_super_fc+0x80/0x80 [ 1307.372862][T30835] sget+0x117/0x560 [ 1307.376916][T30835] ? kill_litter_super+0x60/0x60 [ 1307.381852][T30835] mount_bdev+0xff/0x3c0 [ 1307.386089][T30835] ? ext4_calculate_overhead+0x1250/0x1250 [ 1307.391896][T30835] ext4_mount+0x35/0x40 [ 1307.396056][T30835] ? ext4_nfs_get_inode+0xe0/0xe0 [ 1307.401079][T30835] legacy_get_tree+0x108/0x220 [ 1307.405834][T30835] vfs_get_tree+0x8e/0x300 [ 1307.410255][T30835] do_mount+0x1369/0x1b60 [ 1307.414572][T30835] ? copy_mount_string+0x40/0x40 [ 1307.419490][T30835] ? copy_mount_options+0x270/0x3f0 [ 1307.424678][T30835] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1307.430917][T30835] ? copy_mount_options+0x2e8/0x3f0 [ 1307.436105][T30835] ksys_mount+0xdb/0x150 [ 1307.440335][T30835] __x64_sys_mount+0xbe/0x150 [ 1307.445019][T30835] do_syscall_64+0xfa/0x760 [ 1307.449509][T30835] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1307.455383][T30835] RIP: 0033:0x45d08a [ 1307.459264][T30835] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1307.478883][T30835] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1307.487279][T30835] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a [ 1307.495233][T30835] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1307.503275][T30835] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1307.511230][T30835] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1307.519184][T30835] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:24:48 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="0400cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="ea0000008000000000cbc624877c8252c28f5e87a64820546a1ebe1f6adb3b91e7f1ffd7e4ab569f8eb9808e0b61a0bf7a301ffe8dac0773d9e5411f2b25f3fbc7cf9482c1f0d81a590ed76f2c4af37bd3d331de23d61ca62ef8d48f42ffd913acf060c10300000082fc399eaab8787f0dd1510490b0f420326bcc4e2b65e7c68bacee7877a6274d908e5a5d512b87ed3eb24d00020160d1f3f3c0da4b0638b1d331edbedf8a03a722ffa87cc2dfec4758b087c23cc9c5e726fea942494855d4bd3388b68af3", @ANYRES16=0x0, @ANYRESDEC, @ANYRESHEX=0x0, @ANYRES16, @ANYPTR, @ANYRESDEC], 0x0, 0x10c}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 18:24:48 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2fb, 0x0) 18:24:48 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x23d, 0x0) 18:24:48 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x20b, 0x0) 18:24:48 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x265, 0x0) 18:24:48 executing program 4 (fault-call:0 fault-nth:81): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1313.545430][T30857] FAULT_INJECTION: forcing a failure. [ 1313.545430][T30857] name failslab, interval 1, probability 0, space 0, times 0 [ 1313.637555][T30857] CPU: 1 PID: 30857 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1313.645503][T30857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1313.655761][T30857] Call Trace: [ 1313.659071][T30857] dump_stack+0x197/0x210 [ 1313.663432][T30857] should_fail.cold+0xa/0x15 [ 1313.668037][T30857] ? fault_create_debugfs_attr+0x180/0x180 [ 1313.673892][T30857] ? ___might_sleep+0x163/0x2c0 [ 1313.678756][T30857] __should_failslab+0x121/0x190 [ 1313.683700][T30857] should_failslab+0x9/0x14 [ 1313.688203][T30857] kmem_cache_alloc_trace+0x2d3/0x790 [ 1313.693576][T30857] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1313.699399][T30857] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1313.705041][T30857] __list_lru_init+0x3fe/0x710 [ 1313.709923][T30857] alloc_super+0x7cc/0x910 [ 1313.714350][T30857] ? test_bdev_super_fc+0x80/0x80 [ 1313.719386][T30857] sget+0x117/0x560 [ 1313.723205][T30857] ? kill_litter_super+0x60/0x60 [ 1313.728319][T30857] mount_bdev+0xff/0x3c0 [ 1313.732598][T30857] ? ext4_calculate_overhead+0x1250/0x1250 [ 1313.738416][T30857] ext4_mount+0x35/0x40 [ 1313.738429][T30857] ? ext4_nfs_get_inode+0xe0/0xe0 [ 1313.738450][T30857] legacy_get_tree+0x108/0x220 [ 1313.747640][T30857] vfs_get_tree+0x8e/0x300 [ 1313.747660][T30857] do_mount+0x1369/0x1b60 [ 1313.747682][T30857] ? copy_mount_string+0x40/0x40 [ 1313.766214][T30857] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1313.772486][T30857] ? copy_mount_options+0x2e8/0x3f0 [ 1313.777699][T30857] ksys_mount+0xdb/0x150 [ 1313.777717][T30857] __x64_sys_mount+0xbe/0x150 18:24:48 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2fc, 0x0) 18:24:48 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x266, 0x0) [ 1313.777736][T30857] do_syscall_64+0xfa/0x760 [ 1313.777753][T30857] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1313.777769][T30857] RIP: 0033:0x45d08a [ 1313.800937][T30857] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1313.820557][T30857] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1313.829080][T30857] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a 18:24:48 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x20c, 0x0) [ 1313.837054][T30857] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1313.845029][T30857] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1313.852997][T30857] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1313.860960][T30857] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:24:48 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x267, 0x0) 18:24:49 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2fd, 0x0) 18:24:49 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x20d, 0x0) 18:24:57 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x100000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000000c0)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e38e06c5fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b53606000000000000007c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df1001000000000694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde317fad4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b22645cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f580968af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb010100000000000001a047526865c888c9ff36056cc4ad258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d819164300"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000000)) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='ns\x00') ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000080)=0x0) ioprio_get$uid(0x3, r4) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, 0x0, 0x0) sendmsg$inet_sctp(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10, &(0x7f0000000640)=[{0x0}], 0x1, &(0x7f0000000680)=[@authinfo={0x10, 0x84, 0x6, {0x6}}], 0x10, 0x40}, 0x52050) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:24:57 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x23e, 0x0) 18:24:57 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x268, 0x0) 18:24:57 executing program 4 (fault-call:0 fault-nth:82): syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:24:57 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2fe, 0x0) 18:24:57 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x20e, 0x0) [ 1322.844230][T30916] FAULT_INJECTION: forcing a failure. [ 1322.844230][T30916] name failslab, interval 1, probability 0, space 0, times 0 [ 1322.974842][T30916] CPU: 1 PID: 30916 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 1322.982783][T30916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1322.992931][T30916] Call Trace: [ 1322.996226][T30916] dump_stack+0x197/0x210 [ 1323.000575][T30916] should_fail.cold+0xa/0x15 [ 1323.005288][T30916] ? fault_create_debugfs_attr+0x180/0x180 [ 1323.011103][T30916] ? ___might_sleep+0x163/0x2c0 [ 1323.015959][T30916] __should_failslab+0x121/0x190 [ 1323.020900][T30916] should_failslab+0x9/0x14 [ 1323.025436][T30916] kmem_cache_alloc_trace+0x2d3/0x790 [ 1323.030831][T30916] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1323.036653][T30916] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1323.042294][T30916] __list_lru_init+0x3fe/0x710 [ 1323.047061][T30916] alloc_super+0x7cc/0x910 [ 1323.051479][T30916] ? test_bdev_super_fc+0x80/0x80 [ 1323.056503][T30916] sget+0x117/0x560 [ 1323.060325][T30916] ? kill_litter_super+0x60/0x60 [ 1323.065382][T30916] mount_bdev+0xff/0x3c0 [ 1323.069627][T30916] ? ext4_calculate_overhead+0x1250/0x1250 [ 1323.075441][T30916] ext4_mount+0x35/0x40 [ 1323.079603][T30916] ? ext4_nfs_get_inode+0xe0/0xe0 [ 1323.084628][T30916] legacy_get_tree+0x108/0x220 [ 1323.089409][T30916] vfs_get_tree+0x8e/0x300 [ 1323.093835][T30916] do_mount+0x1369/0x1b60 [ 1323.098529][T30916] ? copy_mount_string+0x40/0x40 [ 1323.103469][T30916] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1323.109837][T30916] ? _copy_from_user+0x12c/0x1a0 [ 1323.117210][T30916] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1323.123561][T30916] ? copy_mount_options+0x2e8/0x3f0 [ 1323.128770][T30916] ksys_mount+0xdb/0x150 [ 1323.133116][T30916] __x64_sys_mount+0xbe/0x150 [ 1323.137798][T30916] do_syscall_64+0xfa/0x760 [ 1323.142300][T30916] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1323.148193][T30916] RIP: 0033:0x45d08a [ 1323.152089][T30916] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 18:24:58 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x23f, 0x0) 18:24:58 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ff, 0x0) 18:24:58 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x269, 0x0) [ 1323.171728][T30916] RSP: 002b:00007fdabd7d0a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1323.180153][T30916] RAX: ffffffffffffffda RBX: 00007fdabd7d0b40 RCX: 000000000045d08a [ 1323.188144][T30916] RDX: 00007fdabd7d0ae0 RSI: 0000000020000080 RDI: 00007fdabd7d0b00 [ 1323.196231][T30916] RBP: 0000000000000001 R08: 00007fdabd7d0b40 R09: 00007fdabd7d0ae0 [ 1323.204205][T30916] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1323.212268][T30916] R13: 00000000004c9eb9 R14: 00000000004e1bc8 R15: 0000000000000003 18:24:58 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x20f, 0x0) 18:24:58 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x300, 0x0) 18:24:58 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x240, 0x0) 18:25:09 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x86, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x17b) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) read(r0, &(0x7f00000000c0)=""/235, 0xeb) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCXONC(r2, 0x540a, 0x3) socket(0x0, 0x0, 0x0) 18:25:09 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x301, 0x0) 18:25:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:25:09 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x26a, 0x0) 18:25:09 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x210, 0x0) 18:25:09 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x241, 0x0) [ 1334.277914][T30969] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:25:09 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x26b, 0x0) 18:25:09 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x302, 0x0) 18:25:09 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x211, 0x0) 18:25:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='\nxt3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:25:09 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x242, 0x0) 18:25:09 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x303, 0x0) 18:25:20 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb9c00a480e180f000000e8bd6efb120009000e000100400000ff0500050012a0", 0x2e}], 0x1}, 0x0) 18:25:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='%xt3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:25:20 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x26c, 0x0) 18:25:20 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x212, 0x0) 18:25:20 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x304, 0x0) 18:25:20 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x243, 0x0) 18:25:20 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x26d, 0x0) 18:25:20 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x213, 0x0) 18:25:20 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x305, 0x0) 18:25:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='\\xt3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:25:21 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x306, 0x0) 18:25:21 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x244, 0x0) 18:25:29 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x0, 0x0, 0x0) 18:25:29 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x214, 0x0) 18:25:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='e\nt3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:25:29 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x26e, 0x0) 18:25:29 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x307, 0x0) 18:25:29 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x245, 0x0) 18:25:30 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x215, 0x0) 18:25:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='e%t3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:25:30 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x308, 0x0) 18:25:30 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x26f, 0x0) 18:25:30 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x246, 0x0) 18:25:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='e\\t3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:25:36 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) 18:25:36 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x309, 0x0) 18:25:36 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x216, 0x0) 18:25:36 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x270, 0x0) 18:25:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ex\n3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:25:36 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x247, 0x0) 18:25:37 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x271, 0x0) 18:25:37 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x30a, 0x0) 18:25:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ex%3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:25:37 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x248, 0x0) 18:25:37 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x272, 0x0) 18:25:37 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x217, 0x0) 18:25:45 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:25:45 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x30b, 0x0) 18:25:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ex\\3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:25:45 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x249, 0x0) 18:25:45 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x218, 0x0) 18:25:45 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x273, 0x0) 18:25:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext\t\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:25:45 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x30c, 0x0) 18:25:45 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x219, 0x0) 18:25:45 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x30d, 0x0) 18:25:46 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x274, 0x0) 18:25:46 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x21a, 0x0) 18:25:52 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:25:52 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x24a, 0x0) 18:25:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext\n\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:25:52 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x275, 0x0) 18:25:52 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x30e, 0x0) 18:25:52 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x21b, 0x0) 18:25:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext%\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:25:53 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x30f, 0x0) 18:25:53 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x21c, 0x0) 18:25:53 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x276, 0x0) 18:25:53 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x24b, 0x0) 18:25:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext/\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:26:00 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:26:00 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x310, 0x0) 18:26:00 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x277, 0x0) 18:26:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:26:00 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x21d, 0x0) 18:26:00 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x24c, 0x0) 18:26:00 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x21e, 0x0) 18:26:00 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x311, 0x0) 18:26:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext7\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:26:00 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x21f, 0x0) 18:26:00 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x312, 0x0) 18:26:00 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x278, 0x0) 18:26:09 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:26:09 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x24d, 0x0) 18:26:09 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x220, 0x0) 18:26:09 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x313, 0x0) 18:26:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext<\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:26:09 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x279, 0x0) 18:26:09 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x314, 0x0) 18:26:09 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x221, 0x0) 18:26:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext\\\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:26:10 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x27a, 0x0) 18:26:10 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x24e, 0x0) 18:26:10 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) 18:26:16 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:26:16 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x222, 0x0) 18:26:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext`\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:26:16 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x27b, 0x0) 18:26:16 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x316, 0x0) 18:26:16 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x24f, 0x0) 18:26:16 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x317, 0x0) 18:26:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='extc\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:26:16 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x223, 0x0) 18:26:16 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x250, 0x0) 18:26:16 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x27c, 0x0) 18:26:16 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x318, 0x0) 18:26:23 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x224, 0x0) 18:26:23 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:26:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x02', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:26:23 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x319, 0x0) 18:26:23 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x251, 0x0) 18:26:23 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x27d, 0x0) 18:26:23 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x27e, 0x0) 18:26:23 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x31a, 0x0) 18:26:23 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x225, 0x0) 18:26:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x03', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:26:23 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x27f, 0x0) 18:26:23 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x252, 0x0) 18:26:23 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x31b, 0x0) 18:26:31 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:26:31 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x226, 0x0) 18:26:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x04', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:26:31 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x31c, 0x0) 18:26:31 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x280, 0x0) 18:26:31 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x253, 0x0) 18:26:31 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x31d, 0x0) 18:26:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x05', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:26:32 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x281, 0x0) 18:26:32 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x227, 0x0) 18:26:32 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x254, 0x0) 18:26:32 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x31e, 0x0) 18:26:40 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:26:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x06', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:26:40 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x31f, 0x0) 18:26:40 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x282, 0x0) 18:26:40 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x255, 0x0) 18:26:40 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x228, 0x0) 18:26:41 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x320, 0x0) 18:26:41 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x283, 0x0) 18:26:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\a', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:26:41 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x256, 0x0) 18:26:41 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x229, 0x0) 18:26:41 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x321, 0x0) 18:26:50 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:26:50 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x284, 0x0) 18:26:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\b', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:26:50 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x322, 0x0) 18:26:50 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x22a, 0x0) 18:26:50 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x257, 0x0) 18:26:50 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x323, 0x0) 18:26:50 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x22b, 0x0) 18:26:50 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x285, 0x0) 18:26:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\t', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:26:50 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x258, 0x0) 18:26:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\n', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:26:56 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:26:56 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 18:26:56 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x286, 0x0) 18:26:56 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x22c, 0x0) 18:26:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x10', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:26:56 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x259, 0x0) 18:26:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3#', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:26:56 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x325, 0x0) 18:26:56 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x22d, 0x0) 18:26:56 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x287, 0x0) 18:26:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3-', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:26:57 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x25a, 0x0) 18:27:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:27:03 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x326, 0x0) 18:27:03 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x22e, 0x0) 18:27:03 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x288, 0x0) 18:27:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3H', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:27:03 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x25b, 0x0) 18:27:03 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x327, 0x0) 18:27:04 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x22f, 0x0) 18:27:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3L', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:27:04 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x289, 0x0) 18:27:04 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x328, 0x0) 18:27:04 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x230, 0x0) 18:27:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:27:11 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x25c, 0x0) 18:27:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3`', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:27:11 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x329, 0x0) 18:27:11 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x231, 0x0) 18:27:11 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x28a, 0x0) 18:27:11 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x32a, 0x0) 18:27:11 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x232, 0x0) 18:27:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3h', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:27:11 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x28b, 0x0) 18:27:11 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x32b, 0x0) 18:27:11 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x25d, 0x0) 18:27:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:27:17 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x233, 0x0) 18:27:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3l', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:27:17 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x32c, 0x0) 18:27:17 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x28c, 0x0) 18:27:17 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x25e, 0x0) 18:27:17 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x32d, 0x0) 18:27:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3t', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:27:17 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x234, 0x0) 18:27:17 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x28d, 0x0) 18:27:17 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x32e, 0x0) 18:27:17 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x25f, 0x0) 18:27:24 executing program 2: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:27:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3z', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:27:24 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x32f, 0x0) 18:27:24 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x28e, 0x0) 18:27:24 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x235, 0x0) 18:27:24 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x260, 0x0) 18:27:24 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x28f, 0x0) 18:27:25 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x330, 0x0) 18:27:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:27:25 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x236, 0x0) [ 1470.323522][T32033] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:27:25 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x261, 0x0) [ 1470.442752][T32033] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:27:25 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x331, 0x0) 18:27:31 executing program 2: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:27:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x10', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:27:31 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x290, 0x0) 18:27:31 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x332, 0x0) 18:27:31 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x237, 0x0) 18:27:31 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x262, 0x0) 18:27:31 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x291, 0x0) 18:27:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:27:31 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) 18:27:31 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x263, 0x0) [ 1476.555243][T32087] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:27:31 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x238, 0x0) 18:27:31 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x334, 0x0) 18:27:37 executing program 2: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:27:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:27:37 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x292, 0x0) 18:27:37 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x239, 0x0) 18:27:37 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x335, 0x0) 18:27:37 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x264, 0x0) [ 1482.434969][T32129] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:27:37 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x336, 0x0) 18:27:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:27:37 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x293, 0x0) 18:27:37 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x23a, 0x0) 18:27:37 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x337, 0x0) [ 1482.865888][T32142] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:27:37 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x265, 0x0) [ 1482.993262][T32142] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:27:43 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:27:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:27:43 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x294, 0x0) 18:27:43 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x338, 0x0) 18:27:43 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x23b, 0x0) 18:27:43 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x266, 0x0) 18:27:43 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x339, 0x0) [ 1488.746973][T32183] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1488.876377][T32183] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:27:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:27:44 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x267, 0x0) 18:27:44 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x33a, 0x0) 18:27:44 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x23c, 0x0) [ 1489.168928][T32197] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:27:44 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x295, 0x0) [ 1489.317400][T32197] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:27:49 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:27:49 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x33b, 0x0) 18:27:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x04', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:27:49 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x268, 0x0) 18:27:49 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x296, 0x0) 18:27:49 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x23d, 0x0) 18:27:50 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x23e, 0x0) 18:27:50 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x33c, 0x0) 18:27:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3 ', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:27:50 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 18:27:50 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x269, 0x0) 18:27:50 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x297, 0x0) 18:27:58 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:27:58 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x23f, 0x0) 18:27:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:27:58 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x33e, 0x0) 18:27:58 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x298, 0x0) 18:27:58 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x26a, 0x0) [ 1503.269959][T32299] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:27:58 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x299, 0x0) [ 1503.382333][T32299] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:27:58 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x240, 0x0) 18:27:58 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x33f, 0x0) 18:27:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x10', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:27:58 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x26b, 0x0) 18:27:58 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x340, 0x0) 18:28:05 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:28:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:28:05 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x241, 0x0) 18:28:05 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x29a, 0x0) 18:28:05 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x341, 0x0) 18:28:05 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x26c, 0x0) [ 1510.577310][T32363] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1510.666032][T32363] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:28:05 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x242, 0x0) 18:28:05 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x342, 0x0) 18:28:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:28:05 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x29b, 0x0) 18:28:06 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x243, 0x0) [ 1511.010667][T32382] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:28:06 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x26d, 0x0) [ 1511.133287][T32382] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:28:11 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:28:11 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x343, 0x0) 18:28:11 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x29c, 0x0) 18:28:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:28:11 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x244, 0x0) 18:28:11 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x26e, 0x0) [ 1516.941037][T32415] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:28:12 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x344, 0x0) 18:28:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:28:12 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x245, 0x0) 18:28:12 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x29d, 0x0) [ 1517.264925][T32436] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:28:12 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x345, 0x0) [ 1517.370300][T32436] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:28:12 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x26f, 0x0) 18:28:19 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:28:19 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x29e, 0x0) 18:28:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:28:19 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x346, 0x0) 18:28:19 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x246, 0x0) 18:28:19 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x270, 0x0) [ 1524.111518][T32475] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1524.188151][T32475] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:28:19 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x347, 0x0) 18:28:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1524.474301][T32487] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:28:19 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x247, 0x0) 18:28:19 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x29f, 0x0) 18:28:19 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x348, 0x0) 18:28:19 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x271, 0x0) [ 1524.681279][T32487] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:28:26 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:28:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:28:26 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x349, 0x0) 18:28:26 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x248, 0x0) 18:28:26 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a0, 0x0) 18:28:26 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x272, 0x0) [ 1531.282032][T32532] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:28:26 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x34a, 0x0) [ 1531.356055][T32532] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:28:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:28:26 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a1, 0x0) [ 1531.631277][T32544] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:28:26 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x273, 0x0) 18:28:26 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x34b, 0x0) 18:28:26 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x249, 0x0) [ 1531.752629][T32544] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:28:35 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:28:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:28:35 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x34c, 0x0) 18:28:35 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x24a, 0x0) 18:28:35 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a2, 0x0) 18:28:35 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x274, 0x0) [ 1540.592710][T32588] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:28:35 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a3, 0x0) 18:28:35 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x34d, 0x0) 18:28:35 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x24b, 0x0) [ 1540.753841][T32588] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:28:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:28:35 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a4, 0x0) 18:28:35 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x275, 0x0) [ 1541.093218][T32613] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:28:43 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:28:43 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x34e, 0x0) 18:28:43 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x24c, 0x0) 18:28:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:28:43 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a5, 0x0) 18:28:43 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x276, 0x0) [ 1548.960091][T32641] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:28:44 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a6, 0x0) 18:28:44 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x34f, 0x0) [ 1549.121207][T32641] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:28:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\xda', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:28:44 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x24d, 0x0) 18:28:44 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x277, 0x0) 18:28:44 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x350, 0x0) 18:28:53 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:28:53 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x24e, 0x0) 18:28:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\xf3', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:28:53 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a7, 0x0) 18:28:53 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) 18:28:53 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x278, 0x0) 18:28:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x8b', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:28:53 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x24f, 0x0) 18:28:53 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x352, 0x0) 18:28:53 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a8, 0x0) 18:28:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\xc0', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:28:53 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x279, 0x0) 18:28:59 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:28:59 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x250, 0x0) 18:28:59 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a9, 0x0) 18:28:59 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x353, 0x0) 18:28:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\xbd', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:28:59 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x27a, 0x0) 18:28:59 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x354, 0x0) 18:28:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:28:59 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x27b, 0x0) 18:28:59 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x355, 0x0) 18:28:59 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2aa, 0x0) 18:29:00 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x251, 0x0) [ 1565.014787][ T312] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1565.125345][ T312] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:29:07 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:29:07 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x356, 0x0) 18:29:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x0f', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:29:07 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ab, 0x0) 18:29:07 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x252, 0x0) 18:29:07 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x27c, 0x0) 18:29:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:29:07 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x357, 0x0) 18:29:08 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ac, 0x0) [ 1573.135186][ T361] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:29:08 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x253, 0x0) 18:29:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:29:08 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x27d, 0x0) [ 1573.456836][ T381] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1573.549719][ T381] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:29:14 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:29:14 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x358, 0x0) 18:29:14 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x254, 0x0) 18:29:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:29:14 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ad, 0x0) 18:29:14 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x27e, 0x0) [ 1579.965685][ T409] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1580.079747][ T409] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:29:15 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x359, 0x0) 18:29:15 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ae, 0x0) 18:29:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x02', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:29:15 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x255, 0x0) 18:29:15 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x27f, 0x0) 18:29:15 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x35a, 0x0) 18:29:25 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:29:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:29:25 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x256, 0x0) 18:29:25 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2af, 0x0) 18:29:25 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x35b, 0x0) 18:29:25 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x280, 0x0) [ 1590.325615][ T466] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:29:25 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x35c, 0x0) 18:29:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x01', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:29:25 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x257, 0x0) 18:29:25 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b0, 0x0) 18:29:25 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x281, 0x0) 18:29:25 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x35d, 0x0) 18:29:34 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b1, 0x0) 18:29:34 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x282, 0x0) 18:29:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:29:34 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x258, 0x0) 18:29:34 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:29:34 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x35e, 0x0) [ 1599.533244][ T520] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:29:34 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b2, 0x0) [ 1599.627092][ T520] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:29:34 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x35f, 0x0) 18:29:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:29:34 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x259, 0x0) 18:29:34 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x283, 0x0) 18:29:34 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x360, 0x0) [ 1599.951635][ T540] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:29:35 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b3, 0x0) [ 1600.079071][ T540] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:29:43 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:29:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:29:43 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b4, 0x0) 18:29:43 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x361, 0x0) 18:29:43 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x284, 0x0) 18:29:43 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x25a, 0x0) [ 1608.884863][ T584] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:29:44 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x362, 0x0) 18:29:44 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b5, 0x0) [ 1609.036985][ T584] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:29:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:29:44 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x25b, 0x0) 18:29:44 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x285, 0x0) [ 1609.374859][ T605] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:29:44 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b6, 0x0) [ 1609.478953][ T605] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:29:50 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:29:50 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x363, 0x0) 18:29:50 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x25c, 0x0) 18:29:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:29:50 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b7, 0x0) 18:29:50 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x286, 0x0) [ 1616.010920][ T638] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:29:51 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b8, 0x0) [ 1616.121779][ T638] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:29:51 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x25d, 0x0) 18:29:51 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x364, 0x0) 18:29:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:29:51 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b9, 0x0) [ 1616.389571][ T662] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:29:51 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x287, 0x0) [ 1616.505017][ T662] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:29:57 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:29:57 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x365, 0x0) 18:29:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:29:57 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ba, 0x0) 18:29:57 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x25e, 0x0) 18:29:57 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x288, 0x0) [ 1622.260577][ T700] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:29:57 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x25f, 0x0) [ 1622.386350][ T700] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:29:57 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2bb, 0x0) 18:29:57 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x366, 0x0) 18:29:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:29:57 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x289, 0x0) [ 1622.742224][ T724] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:29:57 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2bc, 0x0) [ 1622.894986][ T724] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:30:04 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x367, 0x0) 18:30:04 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:30:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:30:04 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x28a, 0x0) 18:30:04 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x260, 0x0) 18:30:04 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2bd, 0x0) [ 1629.448332][ T757] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1629.579296][ T757] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:30:04 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x368, 0x0) 18:30:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:30:04 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x261, 0x0) 18:30:04 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x28b, 0x0) 18:30:04 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2be, 0x0) [ 1629.954304][ T772] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:30:04 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x369, 0x0) [ 1630.054710][ T772] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:30:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1630.389730][ T799] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1630.520045][ T799] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:30:11 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:30:11 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x262, 0x0) 18:30:11 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2bf, 0x0) 18:30:11 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x36a, 0x0) 18:30:11 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x28c, 0x0) 18:30:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1636.669662][ T821] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:30:11 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x36b, 0x0) [ 1636.778838][ T821] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:30:11 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c0, 0x0) 18:30:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1637.099766][ T841] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:30:12 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x263, 0x0) 18:30:12 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x28d, 0x0) 18:30:12 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x36c, 0x0) [ 1637.231115][ T841] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:30:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:30:18 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:30:18 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x36d, 0x0) 18:30:18 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x264, 0x0) 18:30:18 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x28e, 0x0) 18:30:18 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c1, 0x0) [ 1643.852405][ T880] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:30:18 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x36e, 0x0) 18:30:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:30:19 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x265, 0x0) [ 1644.224772][ T894] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:30:19 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x36f, 0x0) 18:30:19 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c2, 0x0) 18:30:19 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x28f, 0x0) [ 1644.389720][ T894] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:30:19 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x266, 0x0) 18:30:25 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:30:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:30:25 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c3, 0x0) 18:30:25 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x370, 0x0) 18:30:25 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x290, 0x0) 18:30:25 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x267, 0x0) [ 1650.999431][ T937] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1651.117363][ T937] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:30:26 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x371, 0x0) 18:30:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:30:26 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c4, 0x0) 18:30:26 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x268, 0x0) 18:30:26 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x372, 0x0) 18:30:26 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x291, 0x0) [ 1651.412852][ T958] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1651.541989][ T958] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:30:32 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:30:32 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c5, 0x0) 18:30:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:30:32 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x373, 0x0) 18:30:32 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x269, 0x0) 18:30:32 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x292, 0x0) [ 1657.259821][ T996] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1657.349404][ T996] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:30:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:30:32 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x293, 0x0) 18:30:32 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x374, 0x0) 18:30:32 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c6, 0x0) [ 1657.721781][ T1014] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1657.821323][ T1014] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:30:32 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) 18:30:32 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c7, 0x0) 18:30:40 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) 18:30:40 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x26a, 0x0) 18:30:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:30:40 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x294, 0x0) 18:30:40 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x376, 0x0) 18:30:40 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c8, 0x0) [ 1665.611577][ T1054] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1665.739348][ T1054] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:30:40 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x377, 0x0) 18:30:40 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x26b, 0x0) 18:30:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:30:40 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x295, 0x0) 18:30:41 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c9, 0x0) 18:30:41 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x378, 0x0) [ 1666.087187][ T1081] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1666.237568][ T1081] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:30:48 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, 0x0, 0x0, 0x0) 18:30:48 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x26c, 0x0) 18:30:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:30:48 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x379, 0x0) 18:30:48 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x296, 0x0) 18:30:48 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ca, 0x0) [ 1673.937212][ T1121] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:30:49 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x26d, 0x0) 18:30:49 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x37a, 0x0) [ 1674.033808][ T1121] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:30:49 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2cb, 0x0) 18:30:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:30:49 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x297, 0x0) 18:30:49 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x37b, 0x0) [ 1674.400034][ T1142] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1674.478375][ T1142] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:30:58 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, 0x0, 0x0, 0x0) 18:30:58 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x26e, 0x0) 18:30:58 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2cc, 0x0) 18:30:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\xff', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:30:58 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x37c, 0x0) 18:30:58 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x298, 0x0) 18:30:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:30:58 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x26f, 0x0) 18:30:58 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x37d, 0x0) [ 1683.435905][ T1190] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:30:58 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2cd, 0x0) 18:30:58 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x299, 0x0) [ 1683.573916][ T1190] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:30:58 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x270, 0x0) 18:31:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:31:07 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ce, 0x0) 18:31:07 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, 0x0, 0x0, 0x0) 18:31:07 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x37e, 0x0) 18:31:07 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x271, 0x0) 18:31:07 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x29a, 0x0) [ 1692.572324][ T1235] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1692.667494][ T1235] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:31:07 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x37f, 0x0) 18:31:07 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2cf, 0x0) 18:31:07 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x272, 0x0) 18:31:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:31:08 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x29b, 0x0) 18:31:08 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x380, 0x0) [ 1693.105333][ T1260] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:31:08 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d0, 0x0) [ 1693.227671][ T1260] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:31:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\xff', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:31:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\xff', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:31:16 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x273, 0x0) 18:31:16 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x381, 0x0) 18:31:16 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d1, 0x0) 18:31:16 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x29c, 0x0) 18:31:16 executing program 2: getpeername(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000240)=0x8ab, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 18:31:17 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x382, 0x0) 18:31:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\xff', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:31:17 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d2, 0x0) 18:31:17 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x274, 0x0) 18:31:17 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x383, 0x0) 18:31:17 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x29d, 0x0) 18:31:17 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d3, 0x0) 18:31:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:31:17 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x275, 0x0) [ 1702.712614][ T1359] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:31:17 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x384, 0x0) [ 1702.853827][ T1359] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:31:17 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d4, 0x0) 18:31:24 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) llistxattr(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 18:31:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:31:24 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x385, 0x0) 18:31:24 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d5, 0x0) 18:31:24 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x276, 0x0) 18:31:24 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x29e, 0x0) [ 1709.219723][ T1407] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:31:24 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x386, 0x0) [ 1709.362089][ T1407] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:31:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\xff', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:31:24 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x29f, 0x0) 18:31:24 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d6, 0x0) 18:31:24 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x387, 0x0) 18:31:24 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x277, 0x0) 18:31:33 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x388, 0x0) 18:31:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\xff', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:31:33 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x30}, 0xc) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="2320212e0fffffff7fb751f069430335c07a356443298afb7f2955460edaa11e8c60034fa0fa4053b8a505539395f19bf331af979a0f2cc1765e2b9360ff66e91a0022549050d0f9f5082a7801002e161e20b0a79088465254eb8fe059ddd3cec25bff2448bebb58e17a956d29b9bce9a7febe50fe272a62c4ff00edca07e5ed07e141f3620eddd744adfc05a43cd4ff6012331f6a819ff23e8580d1fd5b988adba2"], 0x10094) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000840), 0xc) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x1a000) sendto$inet6(r0, &(0x7f00000003c0)="f5", 0x1, 0x0, 0x0, 0x0) 18:31:33 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x278, 0x0) 18:31:33 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a0, 0x0) 18:31:33 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d7, 0x0) 18:31:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\xf9', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:31:33 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x389, 0x0) 18:31:33 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x279, 0x0) 18:31:33 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d8, 0x0) 18:31:34 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x38a, 0x0) 18:31:34 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a1, 0x0) 18:31:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x7f', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:31:34 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d9, 0x0) 18:31:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x14) 18:31:40 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x27a, 0x0) 18:31:40 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x38b, 0x0) 18:31:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x8c', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:31:40 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a2, 0x0) 18:31:40 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2da, 0x0) 18:31:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\xf5', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:31:41 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x27b, 0x0) 18:31:41 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2db, 0x0) 18:31:41 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x38c, 0x0) 18:31:41 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a3, 0x0) 18:31:41 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2dc, 0x0) 18:31:50 executing program 2: 18:31:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\xf6', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:31:50 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x38d, 0x0) 18:31:50 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x27c, 0x0) 18:31:50 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2dd, 0x0) 18:31:50 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a4, 0x0) 18:31:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:31:50 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x38e, 0x0) 18:31:50 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x27d, 0x0) [ 1735.588346][ T1632] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1735.697256][ T1632] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:31:50 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x38f, 0x0) 18:31:50 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a5, 0x0) 18:31:50 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2de, 0x0) 18:31:54 executing program 2: 18:31:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:31:54 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x27e, 0x0) 18:31:54 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x390, 0x0) 18:31:54 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2df, 0x0) 18:31:54 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a6, 0x0) [ 1739.360165][ T1671] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1739.480477][ T1671] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:31:54 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2e0, 0x0) 18:31:54 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x391, 0x0) 18:31:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:31:54 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a7, 0x0) 18:31:54 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x27f, 0x0) 18:31:54 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x392, 0x0) [ 1739.845722][ T1694] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1739.935884][ T1694] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:31:58 executing program 2: 18:31:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:31:58 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x393, 0x0) 18:31:58 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a8, 0x0) 18:31:58 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x280, 0x0) 18:31:58 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2e1, 0x0) [ 1743.605525][ T1728] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:31:58 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x281, 0x0) 18:31:58 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x394, 0x0) 18:31:58 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2e2, 0x0) 18:31:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:31:58 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a9, 0x0) 18:31:59 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x395, 0x0) [ 1743.982087][ T1749] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:31:59 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x282, 0x0) [ 1744.066160][ T1749] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:02 executing program 2: 18:32:02 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2e3, 0x0) 18:32:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:32:02 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x396, 0x0) 18:32:02 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2aa, 0x0) 18:32:02 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x283, 0x0) [ 1747.728851][ T1799] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1747.831449][ T1799] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:02 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x397, 0x0) 18:32:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:32:02 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2e4, 0x0) [ 1748.068515][ T1817] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:03 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x284, 0x0) 18:32:03 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x398, 0x0) 18:32:03 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ab, 0x0) [ 1748.229583][ T1817] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:08 executing program 2: 18:32:08 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2e5, 0x0) 18:32:08 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x399, 0x0) 18:32:08 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x285, 0x0) 18:32:08 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ac, 0x0) 18:32:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1754.119604][ T1860] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:09 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x286, 0x0) 18:32:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:32:09 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x39a, 0x0) [ 1754.460973][ T1874] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:09 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ad, 0x0) 18:32:09 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2e6, 0x0) 18:32:09 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x287, 0x0) [ 1754.585336][ T1874] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:09 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x39b, 0x0) 18:32:13 executing program 2: 18:32:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:32:13 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2e7, 0x0) 18:32:13 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x288, 0x0) 18:32:13 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x39c, 0x0) 18:32:13 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ae, 0x0) [ 1758.225652][ T1915] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1758.311612][ T1915] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:13 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x39d, 0x0) 18:32:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:32:13 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x39e, 0x0) 18:32:13 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x289, 0x0) 18:32:13 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2af, 0x0) [ 1758.698809][ T1932] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:13 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2e8, 0x0) [ 1758.842088][ T1932] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0xee00, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000440)='\x00', 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x3) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdea) close(r0) memfd_create(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, &(0x7f0000000380)={0x1, 0x0, [{0x0, 0x0, 0x0, 0x0, @msi}]}) pipe2$9p(&(0x7f0000000240), 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) 18:32:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:32:17 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x28a, 0x0) 18:32:17 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x39f, 0x0) 18:32:17 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b0, 0x0) 18:32:17 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2e9, 0x0) [ 1762.481574][ T1974] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:17 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a0, 0x0) [ 1762.574047][ T1974] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:32:17 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ea, 0x0) 18:32:17 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x28b, 0x0) [ 1762.917739][ T1989] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:17 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a1, 0x0) 18:32:17 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b1, 0x0) [ 1763.029867][ T1989] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:32:24 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2eb, 0x0) 18:32:24 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a2, 0x0) 18:32:24 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x28c, 0x0) 18:32:24 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0x1c) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000000), 0x4) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[@ANYBLOB="0005000000000004000000000100000000000006c79340d9921b8326ac7e0e39453274482e6d510d214df2c31e9170d4d2e5b76bb40f3ebf9ce887b515e27e3a3b84d1e0e2d284b5b230c4875698753f3887"], 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x62a, 0x0, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) lstat(&(0x7f0000000180)='./file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r4) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x0, 0x2002) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, 0x0, 0x712826bc62fb712b) r5 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r5, 0x0, 0x0, 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f00000001c0)={0x1f, {0x1c, 0x80, 0xa2, 0x1, 0x7f, 0x81}}, 0x8) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) creat(0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x807f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}, 0x4, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x42902, 0x0) fchdir(r6) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 18:32:24 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b2, 0x0) [ 1769.859064][ T2038] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:24 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a3, 0x0) 18:32:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:32:25 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x28d, 0x0) 18:32:25 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ec, 0x0) 18:32:25 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b3, 0x0) [ 1770.252226][ T2056] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:25 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a4, 0x0) [ 1770.374802][ T2056] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:32:25 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a5, 0x0) 18:32:25 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ed, 0x0) 18:32:25 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x28e, 0x0) [ 1770.666130][ T2074] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1770.795951][ T2074] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:31 executing program 2: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x80}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-control\x00', 0x528203, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x71, 0x0, {{0x0, 0x3, 0x8}, 0x400}}, 0x18) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ab64}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f00000005c0)=ANY=[@ANYBLOB="082000000000000000c71500000000df0fe8cdbb7b3c0f75c9777cb5fe6e73f7e06e4f5524f599724efaefc4fea1767d49f1772a5cc18073659946cb10b4c20eca1f2095d61f6436e5d0c86f223084a63f3055394b83c2c226e9761f0ef0c8"]) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x18259, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x10400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x400, 0x200040) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000100)=0x2000000000000074, 0x4) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) r5 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r5, &(0x7f0000000080)={0x0, 0xffffffffffffffa2, &(0x7f0000000000)=[{&(0x7f0000000680)="230000005e0081aee4050c00000f00000000a30000ffffff9e8b1832e0b58bc609f6d8", 0x23}], 0x1}, 0x0) recvmsg(r5, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000480)={0x5c, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xec}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x20000004, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x49) connect$inet6(r6, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r6, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_opts(r6, 0x29, 0x39, &(0x7f0000000000)=ANY=[@ANYBLOB="890004ff02000100000000000000000000ffffac1414110000000000000000000000000000000059f200"/53], 0x18) fcntl$setstatus(r6, 0x4, 0x2000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendto$inet(r4, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 18:32:31 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b4, 0x0) 18:32:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:32:31 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a6, 0x0) 18:32:31 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ee, 0x0) 18:32:31 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x28f, 0x0) [ 1777.016265][ T2112] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1777.127696][ T2112] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:32 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a7, 0x0) 18:32:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:32:32 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x290, 0x0) 18:32:32 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ef, 0x0) 18:32:32 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b5, 0x0) [ 1777.403903][ T2132] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:32 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3e2, 0x0) [ 1777.568766][ T2132] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:39 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x291, 0x0) 18:32:39 executing program 2: msgsnd(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgrcv(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB], 0x1, 0x0, 0x0) msgrcv(0x0, &(0x7f00000000c0)={0x0, ""/147}, 0x9b, 0xd6d0c418f59fe7d3, 0x0) 18:32:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:32:39 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2f0, 0x0) 18:32:39 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b6, 0x0) 18:32:39 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x2) [ 1784.275746][ T2168] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:39 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x3) 18:32:39 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x292, 0x0) [ 1784.432388][ T2168] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:39 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x4) 18:32:39 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2f1, 0x0) 18:32:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:32:39 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b7, 0x0) 18:32:39 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x5) [ 1784.775151][ T2198] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1784.883640][ T2198] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:49 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="00040000b1"], 0x9) 18:32:49 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x293, 0x0) 18:32:49 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x6) 18:32:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:32:49 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2f2, 0x0) 18:32:49 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b8, 0x0) [ 1794.739654][ T2232] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:49 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7) 18:32:49 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x294, 0x0) 18:32:49 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2f3, 0x0) [ 1794.894901][ T2232] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:32:50 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x10) 18:32:50 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x295, 0x0) [ 1795.182598][ T2263] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1795.271444][ T2263] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:56 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b9, 0x0) 18:32:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_OPERSTATE={0x8, 0xa, 0xf}]}, 0x30}}, 0x0) 18:32:56 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2f4, 0x0) 18:32:56 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x300) 18:32:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:32:56 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x296, 0x0) [ 1802.054950][ T2286] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:57 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x500) [ 1802.161925][ T2286] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:57 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2f5, 0x0) 18:32:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:32:57 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x600) 18:32:57 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ba, 0x0) 18:32:57 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x297, 0x0) [ 1802.560728][ T2314] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:32:57 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x700) [ 1802.767630][ T2314] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:33:06 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x4000) 18:33:06 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x298, 0x0) 18:33:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) memfd_create(0x0, 0x0) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) 18:33:06 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2f6, 0x0) 18:33:06 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2bb, 0x0) 18:33:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:33:06 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x100000) [ 1811.306620][ T2355] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:33:06 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x299, 0x0) [ 1811.411283][ T2355] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:33:06 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2f7, 0x0) 18:33:06 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0xf0ff7f) 18:33:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:33:06 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2bc, 0x0) 18:33:06 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x29a, 0x0) 18:33:06 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x1000000) [ 1811.748072][ T2382] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1811.867178][ T2382] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:33:15 executing program 2: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x24d42ca6) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) tkill(r0, 0x1000000000015) 18:33:15 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2f8, 0x0) 18:33:15 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x2000000) 18:33:15 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x29b, 0x0) 18:33:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:33:15 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2bd, 0x0) [ 1820.493279][ T2417] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:33:15 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x3000000) [ 1820.589584][ T2417] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:33:15 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2f9, 0x0) 18:33:15 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x29c, 0x0) 18:33:15 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x4000000) 18:33:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:33:15 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x5000000) [ 1820.879733][ T2442] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1821.005198][ T2442] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:33:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0affefff7f000000001e6ea64aa8e1c9", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 18:33:24 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2be, 0x0) 18:33:24 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x29d, 0x0) 18:33:24 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x6000000) 18:33:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:33:24 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2fa, 0x0) [ 1829.870579][ T2472] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:33:24 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7000000) [ 1830.012479][ T2472] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:33:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:33:25 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x40000000) 18:33:25 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2bf, 0x0) 18:33:25 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7fffefdf) 18:33:25 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2fb, 0x0) [ 1830.360967][ T2498] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1830.477393][ T2498] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:33:32 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000100)='threaded\x00', 0x9) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000043f6a9e358eaa828cba05c14bb89774b4e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1b0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d5", 0x0, 0x100}, 0x28) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000043f6a9e358eaa828cba05c14bb89774b4e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1b0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d5", 0x0, 0x100}, 0x28) 18:33:32 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x29e, 0x0) 18:33:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:33:32 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7ffff000) 18:33:32 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c0, 0x0) 18:33:32 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2fc, 0x0) 18:33:32 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0xdfefff7f) [ 1837.165403][ T2537] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:33:32 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2fd, 0x0) [ 1837.253889][ T2537] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:33:32 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x29f, 0x0) 18:33:32 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7ffffffff000) 18:33:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:33:32 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c1, 0x0) [ 1837.695071][ T2572] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1837.802800][ T2572] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:33:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f00000000c0)={0x7b, 0x5, [0x40000099], [0xc1]}) 18:33:41 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x10000000000000) 18:33:41 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2fe, 0x0) 18:33:41 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a0, 0x0) 18:33:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:33:41 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c2, 0x0) [ 1846.411441][ T2602] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:33:41 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0xf0ff7f00000000) 18:33:41 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ff, 0x0) [ 1846.521276][ T2602] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:33:41 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0xf0ffffff7f0000) 18:33:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:33:41 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a1, 0x0) 18:33:41 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x100000000000000) [ 1846.879994][ T2625] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1846.998071][ T2625] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:33:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0xfffffffffffffffb, 0x59, 0x81, @buffer={0x0, 0x7e, &(0x7f0000000300)=""/126}, &(0x7f00000003c0)="847f3273c5a3eec8cdbdad71e0598b0e6f2df8d2263f094b7d2ba9d189dbd3ded8ebb4e0489d6052fbe889222fdc9cc63bfe1ca24d93601fc704d2becbdfdb50e5b2f32be169c71a3a559909eee603709f833fa57a294a878b", &(0x7f0000000440)=""/255, 0x1ff, 0x4, 0x2, &(0x7f0000000100)}) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14, 0x69, 0x1, {0x1, 0x4, 0x5}}, 0x14) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000380)={'syz'}, &(0x7f00000001c0)="bc", 0x1, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='ns\x00') setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000140)={0xffffff80, 0x6, 0x78c, 0x3}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000140)) syz_kvm_setup_cpu$x86(r1, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffd32, 0x23, 0x0, 0xdd) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 18:33:48 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x300, 0x0) 18:33:48 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c3, 0x0) 18:33:48 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x200000000000000) 18:33:48 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a2, 0x0) 18:33:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1853.651469][ T2662] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:33:48 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x301, 0x0) 18:33:48 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x300000000000000) [ 1853.790375][ T2662] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:33:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:33:48 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x400000000000000) 18:33:49 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x302, 0x0) [ 1854.102134][ T2687] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:33:49 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x500000000000000) [ 1854.226123][ T2687] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:33:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0xfffffffffffffffb, 0x59, 0x81, @buffer={0x0, 0x7e, &(0x7f0000000300)=""/126}, &(0x7f00000003c0)="847f3273c5a3eec8cdbdad71e0598b0e6f2df8d2263f094b7d2ba9d189dbd3ded8ebb4e0489d6052fbe889222fdc9cc63bfe1ca24d93601fc704d2becbdfdb50e5b2f32be169c71a3a559909eee603709f833fa57a294a878b", &(0x7f0000000440)=""/255, 0x1ff, 0x4, 0x2, &(0x7f0000000100)}) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14, 0x69, 0x1, {0x1, 0x4, 0x5}}, 0x14) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000380)={'syz'}, &(0x7f00000001c0)="bc", 0x1, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='ns\x00') setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000140)={0xffffff80, 0x6, 0x78c, 0x3}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000140)) syz_kvm_setup_cpu$x86(r1, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffd32, 0x23, 0x0, 0xdd) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 18:33:56 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a3, 0x0) 18:33:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:33:56 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x600000000000000) 18:33:56 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c4, 0x0) 18:33:56 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x303, 0x0) [ 1861.162841][ T2725] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:33:56 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x700000000000000) 18:33:56 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a4, 0x0) [ 1861.283726][ T2725] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:33:56 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x304, 0x0) 18:33:56 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x4000000000000000) 18:33:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:33:56 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c5, 0x0) [ 1861.729963][ T2761] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1861.848722][ T2761] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:34:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0xfffffffffffffffb, 0x59, 0x81, @buffer={0x0, 0x7e, &(0x7f0000000300)=""/126}, &(0x7f00000003c0)="847f3273c5a3eec8cdbdad71e0598b0e6f2df8d2263f094b7d2ba9d189dbd3ded8ebb4e0489d6052fbe889222fdc9cc63bfe1ca24d93601fc704d2becbdfdb50e5b2f32be169c71a3a559909eee603709f833fa57a294a878b", &(0x7f0000000440)=""/255, 0x1ff, 0x4, 0x2, &(0x7f0000000100)}) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14, 0x69, 0x1, {0x1, 0x4, 0x5}}, 0x14) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000380)={'syz'}, &(0x7f00000001c0)="bc", 0x1, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='ns\x00') setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000140)={0xffffff80, 0x6, 0x78c, 0x3}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000140)) syz_kvm_setup_cpu$x86(r1, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffd32, 0x23, 0x0, 0xdd) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 18:34:05 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x305, 0x0) 18:34:05 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0xdfefff7f00000000) 18:34:05 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a5, 0x0) 18:34:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:34:05 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c6, 0x0) 18:34:05 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x280101, 0x1) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x4}}, 0x18) [ 1870.632701][ T2791] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1870.742113][ T2791] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:34:05 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x306, 0x0) 18:34:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:34:06 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x307, 0x0) 18:34:06 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c7, 0x0) 18:34:06 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a6, 0x0) [ 1871.144783][ T2816] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:34:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x53, 0xfffffffffffffffb, 0x59, 0x81, @buffer={0x0, 0x7e, &(0x7f0000000300)=""/126}, &(0x7f00000003c0)="847f3273c5a3eec8cdbdad71e0598b0e6f2df8d2263f094b7d2ba9d189dbd3ded8ebb4e0489d6052fbe889222fdc9cc63bfe1ca24d93601fc704d2becbdfdb50e5b2f32be169c71a3a559909eee603709f833fa57a294a878b", &(0x7f0000000440)=""/255, 0x1ff, 0x4, 0x2, &(0x7f0000000100)}) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14, 0x69, 0x1, {0x1, 0x4, 0x5}}, 0x14) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000380)={'syz'}, &(0x7f00000001c0)="bc", 0x1, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='ns\x00') setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000140)={0xffffff80, 0x6, 0x78c, 0x3}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000140)) syz_kvm_setup_cpu$x86(r1, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffd32, 0x23, 0x0, 0xdd) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 18:34:14 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc05c6104, &(0x7f0000000000)) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000000)=0x10040, 0x4) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r1, 0x10, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}]}, 0x24}}, 0x20005840) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x820882}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x2, 0x70bd29, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x3a8, 0x0) 18:34:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:34:14 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x308, 0x0) 18:34:14 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a7, 0x0) 18:34:14 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c8, 0x0) [ 1879.940322][ T2847] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:34:15 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='sessionid\x00') preadv(r0, &(0x7f0000000040), 0x0, 0x0) [ 1880.068326][ T2847] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:34:15 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x309, 0x0) 18:34:15 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a8, 0x0) 18:34:15 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c9, 0x0) 18:34:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:34:15 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc05c6104, &(0x7f0000000000)) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_matches\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) [ 1880.421822][ T2873] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1880.591696][ T2873] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:34:24 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 18:34:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x5b6, 'memory'}]}, 0xfdef) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r2, 0x0, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0xa, 0x0, 0x11) signalfd(0xffffffffffffffff, &(0x7f0000000200)={0x2}, 0x8) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) 18:34:24 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x30a, 0x0) 18:34:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\xff', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:34:24 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ca, 0x0) 18:34:24 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2a9, 0x0) 18:34:24 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x30b, 0x0) 18:34:24 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2aa, 0x0) 18:34:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:34:24 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x30c, 0x0) 18:34:24 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') prctl$PR_SET_SECUREBITS(0x1c, 0x20) [ 1889.819355][ T2928] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:34:24 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2cb, 0x0) [ 1889.963202][ T2928] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:34:24 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 18:34:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:34:33 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ab, 0x0) 18:34:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) getpid() r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 18:34:33 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x30d, 0x0) 18:34:33 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2cc, 0x0) 18:34:33 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @multicast1}, 0x3a) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20, @broadcast}, 0x10) sendmmsg$inet(r1, &(0x7f0000003280)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000700)="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", 0x901}, {&(0x7f0000001700)="1c", 0x1}], 0x2}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000002440)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000002840)=[{&(0x7f0000002480)="e60b2ca635608c31af2dc627f8030b43760532dd8a2a25521f91e36c40cada25a3f2ce58eebeaf123f8a907941d89ca98cbdee746666b7d1a2e909dd1582e0139167ca6b73cd22b4b73a26a0c53a35f0a6bdb305d521b6f28f4135cf0ca291cb01490e3601001c48c53315b31a13b1732d53bfdcb839b8b77eca8fc9", 0x7c}, {&(0x7f0000002500)="3c5608410d473e765b7e68b896f222aa55499dff49895329309fe473a0250e9dca9268721ecb5283009b5ac50818c7", 0x2f}, {&(0x7f0000002540)="98b164dee629c2fb7412159fc6a32278341ad047fa3562186880ec869aac5b492058eaacc7aa97244ac9a3b38e238bf57275114577a97938b31327a624779062abc128fb89c510d8cd470a188517ce1f94af3d7c3422fd018aed9b2b565a057be32870fbe434ff5b1534c486343287644c2aec5eb23e331724b8559adb5488ce5e3a7fed66f3467cb6f2ae4306497bedc1c54d9bfcbfc2c3c3e7b20da98a5b42ec6afeeeb79a7fd34ececf8dee9fea56aaa7950473abde42fd5ffeb8eafb40c6", 0xc0}, {&(0x7f0000002600)="bbb32924aa64d94d458f1cddd5cad6f9d604eb65fc1af16ed21b11422abc9eea5d071acbda18a68a6fd9f711eae3265544880d8b3c28eb61eef0b19448ed36894478eabd4404f5ba299476ec3989e641739ab6f7a7", 0x55}, {&(0x7f0000002680)="90246b5cc5b5de16ca59d952bd0ff80514b6b4b0dd4aa87838c080f0ef132851fb7a09d4bb97791e819f47fc298505aa1979654470c98ec4d533ec243bfba56b4b", 0x41}, {&(0x7f0000002700)="714cf4d32ce7d1a3930c48cb60b5bd8b24eb3468d021fdc1a3da9fc100245f80a99273e0a47f6e5956c6e56c0aa3fd619a8c4d19ae6bafd3193570857ee9ae405824ded162d8e1f3383a3628e4b92671666e92a05f7be84aac9a76c7d29932", 0x5f}, {&(0x7f0000002780)="8732c029c6ca6f256a9fc8930f9e329530fc136ac668af3add1b26e139a89bc33f3d608dd58d4e06f706f1b32ea2a9f42711b880bcd10501b96bc5a4c99dce9ee9fb76fb7a9ccc71f8f70480bcb3de5624388961c1aff15ab80fcddb08a33ff8659e7a2b5235c236c7ea2fbf61c26407c3255540b458ba76a5ea27be0cfd4edd9332cc62f020d462", 0x88}], 0x7, &(0x7f0000002880)=[@ip_pktinfo={{0x18, 0x0, 0x8, {0x0, @empty, @dev}}}, @ip_tos_u8={{0xd}}], 0x28}}, {{&(0x7f00000028c0)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000003200)=[{&(0x7f0000002900)="e90b14f8cf650d1106ac7cd6e0307ab8210c6c7e524f23af54f21fa4b9584ef9a60d6aee8c908134600d5cb548a2747c88a1603f880a96b7ced507625a0584d5e27e25d6627e3ebea1", 0x49}, {&(0x7f0000002f80)="8e84937a445fe15efdfc052096611a75e6e4fe5dddef287b057a1d1bddfd6d141d6307b0421fa1e82121705c266a6011da392050985135b804af7b0e718e13f316c953ff9020d4d14759648f1f487634ed6f22d9bc9a2b70b0e1ffc1828aecabdfebb3856b14caa7fe9fe9b9dd6e16f23ba265914f4fb3a49a0640028c7e03f1202d6f0b8f71600114c31fcff6e17432d8badaed2d48c0c4a23e112d8c8973b6fabc5bc3e4e84ba8b7b2e82da8afc362a00761f69de7e48fa1699d4c98b272a3e795a7b406f803190d851abdee5154f50ea0b16ba73435be7acd59f86beb6c", 0xdf}, {&(0x7f0000002980)="9f4a222c12140705f6c5a4299b208a7c8f98b78446cc8b388ef5291acadb8e41d62869efc7f137183ccae38d88f7afaf82551e1ffea25f215b85ca29d5fb1a665357b3a4d59485a8777fb5694a87c38812dac9788f27670a", 0x58}, {&(0x7f0000003080)="4b483173b21b1388d3885e9cbed6ed74df21b45291b19dac2a979ba3e18c797fa8cfa8f41635ec48e205ca3944f19ef418bae8bf4ab11c35a5f2e5cee0d89254a1ad5353c977f3df5547b9954e35e3ab80a615aaa1e94111902accc6b98dbd9e94ca70a9d33476ba9f40b8c923fbc50ce3aeab405b7e0ab43fa05b7692ba8b6da11561dccb5a97b8d3afcebe61ca5fb19f7598f9274a006f7c9eee41cc91180ccbe486c27191d13f0ae8831e1311f53498a1b0ae2b", 0xb5}, {&(0x7f0000003140)="11b92f8648741ca2c55608cb8a72783105958aff7b0b8b89b63706a9f18bc0347de89657442943765f6369272a67a4628a9d51f282d1b078e9cd8f536860fa641e92612506ddd78c111f932a37059b7b2ab71832fdc29e86bcada337f888fe92aeaaebdcdb7c774103bfaf38e60cf5fc8d899497a90222db991db68df27413dc715d0a45565fce9b622cd84bc6fbf43bd68e13073e3cfefcb5b3888d73191044", 0xa0}, {&(0x7f0000003ac0)="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", 0x1000}], 0x6, &(0x7f0000003240)=[@ip_tos_u8={{0xd}}], 0x10}}], 0x4, 0x6049054) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000000)) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r3, &(0x7f00000017c0), 0x3a8, 0x0) [ 1898.911861][ T2973] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:34:33 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x30e, 0x0) 18:34:34 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400000, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000040)={0x0, 0x8, 0x1, 0x5, 0xfffffffc}) r1 = gettid() syz_open_procfs(r1, &(0x7f0000000240)='fdinfo/4\x00') r2 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0xc05c6104, &(0x7f0000000000)) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) r6 = getpid() ptrace(0x4206, r6) ptrace$getregset(0x4205, r6, 0x2, &(0x7f0000000000)={0x0, 0x10}) r7 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) r8 = getpgrp(r1) sched_setscheduler(r8, 0x5, &(0x7f00000002c0)) r9 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r9, 0x0, 0x7, &(0x7f0000000500)='eth1(.\x00', 0xffffffffffffffff}, 0x30) r11 = getpgrp(r10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x81, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x3}, 0x0, 0x0, &(0x7f00000002c0)={0x5, 0x7, 0x7}, &(0x7f0000000340)=0x8d, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x4}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r11, r9, 0x0, 0x7, &(0x7f0000000100)='#wlan1\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f00000002c0)='em0@em0%.#\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r7, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)='GPLeth0\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r6, r5, 0x0, 0xc, &(0x7f0000000180)='/dev/uinput\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r1, r2, 0x0, 0x17, &(0x7f00000000c0)='ppp0(posix_acl_access%\x00', r12}, 0x30) process_vm_readv(r13, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000080)=""/34, 0x22}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r14 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r14, &(0x7f00000017c0), 0x3a8, 0x0) 18:34:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:34:34 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ac, 0x0) [ 1899.317543][ T2991] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1899.444267][ T2991] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:34:34 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780), 0x0, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc05c6104, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x10001}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={r1, 0x20, &(0x7f00000000c0)=[@in={0x2, 0x4e21, @rand_addr=0x177}, @in={0x2, 0x4e24, @loopback}]}, &(0x7f0000000140)=0x10) r2 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0xc05c6104, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x7, r2, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r3, &(0x7f00000017c0), 0x3a8, 0x0) 18:34:34 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2cd, 0x0) 18:34:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:34:34 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x30f, 0x0) [ 1899.806073][ T3013] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1899.927476][ T3013] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:34:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x3dc) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x663abba741622feb) ioctl$KVM_NMI(r2, 0xae9a) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:34:41 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x310, 0x0) 18:34:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:34:41 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ad, 0x0) 18:34:41 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ce, 0x0) 18:34:41 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000006c0)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f00000007c0)=0xe8) r2 = geteuid() r3 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x3d, 0x9, &(0x7f00000005c0)=[{&(0x7f0000000080)="33915a007c94cb867284ccff82d1a2f0d94461bb2becd5e267c4afdc8c77532fc9710cd263f904630bbddc1b213ffff3872bb48914c49ce2300bc68c8af4db6a833ebfe2d383462d292f381ff01414aba9667fc8a34630f9390f65c960f0fe884a04596eca07f9b9dc1aee9f267b3c3ea19b2317284765034d351501a5c8eb75dad9c57d65e4750d99b3845b9220a57c0519d0eba6df6b0cbffc2798129ae70e88247a5f8f5dc28e0dd6e349ac7dc266dcd4cfcaf2b625f6d413800498adb728f078a8511023ab24a637c9f08d94c6a05350d1602514f3d22c4c58764c2227a6ab5bd739c97d04324fb1e2", 0xeb, 0x80000001}, {&(0x7f0000000180)="d3db1888f170b840258a84eb3e6144ded716deb565b9d080bdb82aea9a2d2ac0e87ae82dcf632491f743822ee1273918e68f283457acb0e596693c01eb371e285ee815e7b235f817af62eac59054fd94b202a9ca9b8b7359676a61820c0daed39e625b2bd34a3656835aece9013948960b9760", 0x73}, {&(0x7f0000000200)="875e07d4c571fc295e70f55be94115c648aec2b6f31a", 0x16, 0x9}, {&(0x7f0000000280)="706318abfe7db9229967ab1fd8fd615e9fd7788e723c6e5b6fe7fd0af362e62d592a0c98ae912c", 0x27, 0x2abf}, {&(0x7f00000002c0)="c0aae473a946260792d3b8f7eea2e1e979795e5d3c1ea6a50c3aecbabc0b9e562c5d97375d773cc0fac27645d27123962650fb74d0d8dff20c9f5be46b4f86fa63ae297046c163d1ee210944885289af6ec019ecb08437b68c31cbd5f7dc8c8cd1b4a583828e78a77658b6dfa746d36409087eb17619328d0810eab685525cbee4280131124360749621f7c4df4cc064d9a0cb63aca59bf9ee6a84eb45179759e8559514660d2b686ae8cdb0a049b828264bc62e63f47482e079c8118fe00b74fa4650cf14a6296a018c6a2ed2", 0xcd, 0xffffffff}, {&(0x7f00000003c0)="07df75d3f0846602b1643e822e3c3c9bf51dadd8480735804fb3ec2338d9bc36feb517f74402c7b08d4a2994e2b2ea9b0aeba63ed8ae44bd2b7c0aff4c8096c0", 0x40, 0x56}, {&(0x7f0000000400)="aad4ef533723ba848a1b19d4a03e179dbefca962b007481e1c2b0781726d6b83bd7e34d820ee30683cb49bad31c8b5fc03bdc98bfd3f11b319f7e4f61cc48ceb366697b091940294", 0x48, 0x9}, {&(0x7f0000000480)="6a20537207f555e2b38c9a498403381e92f68bafb3da89b0e2af923b609b9825eb853805d7eb4386173b8c1f13687d1f724be9c5df2ca78a7db1d7a4cf3dbcc6d44f83d3f0c23e27f6a65097b831d43241fcaa542ced687bdb04aa14d175c2747675b1fb3287ee3d051280e83f9f26e9276c6bda4a24d80bf20a883f6f7bf7c06a1cc5c18e3bea103a5778d9ac923e8c04aaa0d62571215241961564d64881c357a4d1879cb6785c97334a1633349786d2f2c4b8c10273b19a5f2de53697167c536056d26c0c5abc212faaf41636fedeef164d6ee6d00c762f1c271f6968a0c69590552cc5055fd3", 0xe8, 0x1}, {&(0x7f0000000580)="c982bcaea23c3543651846edafdce4bfa67565afc5f4edb03ba8a0954e6b940e3d3f967eeaa9646d91a3ae4f108e56745bb4b846872384", 0x37, 0x8}], 0x20840, &(0x7f0000000800)={[{@dmode={'dmode'}}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@euid_gt={'euid>', r1}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@euid_lt={'euid<', r4}}, {@pcr={'pcr', 0x3d, 0x17}}, {@obj_role={'obj_role'}}]}) [ 1906.185559][ T3041] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:34:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:34:41 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysfs$3(0x3) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x88700, 0x0) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x3) r1 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0xc05c6104, &(0x7f0000000000)) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f00000001c0)={{&(0x7f0000000280)=""/214, 0xd6}, &(0x7f0000000180), 0x42}, 0x20) r2 = gettid() syz_open_procfs(r2, &(0x7f0000000240)='fdinfo/4\x00') waitid(0x0, r2, &(0x7f0000000040), 0x8, &(0x7f00000000c0)) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r3, &(0x7f00000017c0), 0x3a8, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000100)={0x2, 0x4e20, @multicast1}, 0x3a) setsockopt$sock_int(r4, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r4, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r4, &(0x7f0000003280)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000700)="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", 0x901}, {&(0x7f0000001700)="1c", 0x1}], 0x2}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000002440)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000002840)=[{&(0x7f0000002480)="e60b2ca635608c31af2dc627f8030b43760532dd8a2a25521f91e36c40cada25a3f2ce58eebeaf123f8a907941d89ca98cbdee746666b7d1a2e909dd1582e0139167ca6b73cd22b4b73a26a0c53a35f0a6bdb305d521b6f28f4135cf0ca291cb01490e3601001c48c53315b31a13b1732d53bfdcb839b8b77eca8fc9", 0x7c}, {&(0x7f0000002500)="3c5608410d473e765b7e68b896f222aa55499dff49895329309fe473a0250e9dca9268721ecb5283009b5ac50818c7", 0x2f}, {&(0x7f0000002540)="98b164dee629c2fb7412159fc6a32278341ad047fa3562186880ec869aac5b492058eaacc7aa97244ac9a3b38e238bf57275114577a97938b31327a624779062abc128fb89c510d8cd470a188517ce1f94af3d7c3422fd018aed9b2b565a057be32870fbe434ff5b1534c486343287644c2aec5eb23e331724b8559adb5488ce5e3a7fed66f3467cb6f2ae4306497bedc1c54d9bfcbfc2c3c3e7b20da98a5b42ec6afeeeb79a7fd34ececf8dee9fea56aaa7950473abde42fd5ffeb8eafb40c6", 0xc0}, {&(0x7f0000002600)="bbb32924aa64d94d458f1cddd5cad6f9d604eb65fc1af16ed21b11422abc9eea5d071acbda18a68a6fd9f711eae3265544880d8b3c28eb61eef0b19448ed36894478eabd4404f5ba299476ec3989e641739ab6f7a7", 0x55}, {&(0x7f0000002680)="90246b5cc5b5de16ca59d952bd0ff80514b6b4b0dd4aa87838c080f0ef132851fb7a09d4bb97791e819f47fc298505aa1979654470c98ec4d533ec243bfba56b4b", 0x41}, {&(0x7f0000002700)="714cf4d32ce7d1a3930c48cb60b5bd8b24eb3468d021fdc1a3da9fc100245f80a99273e0a47f6e5956c6e56c0aa3fd619a8c4d19ae6bafd3193570857ee9ae405824ded162d8e1f3383a3628e4b92671666e92a05f7be84aac9a76c7d29932", 0x5f}, {&(0x7f0000002780)="8732c029c6ca6f256a9fc8930f9e329530fc136ac668af3add1b26e139a89bc33f3d608dd58d4e06f706f1b32ea2a9f42711b880bcd10501b96bc5a4c99dce9ee9fb76fb7a9ccc71f8f70480bcb3de5624388961c1aff15ab80fcddb08a33ff8659e7a2b5235c236c7ea2fbf61c26407c3255540b458ba76a5ea27be0cfd4edd9332cc62f020d462", 0x88}], 0x7, &(0x7f0000002880)=[@ip_pktinfo={{0x18, 0x0, 0x8, {0x0, @empty, @dev}}}, @ip_tos_u8={{0xd}}], 0x28}}, {{&(0x7f00000028c0)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000003200)=[{&(0x7f0000002900)="e90b14f8cf650d1106ac7cd6e0307ab8210c6c7e524f23af54f21fa4b9584ef9a60d6aee8c908134600d5cb548a2747c88a1603f880a96b7ced507625a0584d5e27e25d6627e3ebea1", 0x49}, {&(0x7f0000002f80)="8e84937a445fe15efdfc052096611a75e6e4fe5dddef287b057a1d1bddfd6d141d6307b0421fa1e82121705c266a6011da392050985135b804af7b0e718e13f316c953ff9020d4d14759648f1f487634ed6f22d9bc9a2b70b0e1ffc1828aecabdfebb3856b14caa7fe9fe9b9dd6e16f23ba265914f4fb3a49a0640028c7e03f1202d6f0b8f71600114c31fcff6e17432d8badaed2d48c0c4a23e112d8c8973b6fabc5bc3e4e84ba8b7b2e82da8afc362a00761f69de7e48fa1699d4c98b272a3e795a7b406f803190d851abdee5154f50ea0b16ba73435be7acd59f86beb6c", 0xdf}, {&(0x7f0000002980)="9f4a222c12140705f6c5a4299b208a7c8f98b78446cc8b388ef5291acadb8e41d62869efc7f137183ccae38d88f7afaf82551e1ffea25f215b85ca29d5fb1a665357b3a4d59485a8777fb5694a87c38812dac9788f27670a", 0x58}, {&(0x7f0000003080)="4b483173b21b1388d3885e9cbed6ed74df21b45291b19dac2a979ba3e18c797fa8cfa8f41635ec48e205ca3944f19ef418bae8bf4ab11c35a5f2e5cee0d89254a1ad5353c977f3df5547b9954e35e3ab80a615aaa1e94111902accc6b98dbd9e94ca70a9d33476ba9f40b8c923fbc50ce3aeab405b7e0ab43fa05b7692ba8b6da11561dccb5a97b8d3afcebe61ca5fb19f7598f9274a006f7c9eee41cc91180ccbe486c27191d13f0ae8831e1311f53498a1b0ae2b", 0xb5}, {&(0x7f0000003140)="11b92f8648741ca2c55608cb8a72783105958aff7b0b8b89b63706a9f18bc0347de89657442943765f6369272a67a4628a9d51f282d1b078e9cd8f536860fa641e92612506ddd78c111f932a37059b7b2ab71832fdc29e86bcada337f888fe92aeaaebdcdb7c774103bfaf38e60cf5fc8d899497a90222db991db68df27413dc715d0a45565fce9b622cd84bc6fbf43bd68e13073e3cfefcb5b3888d73191044", 0xa0}, {&(0x7f0000003ac0)="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", 0x1000}], 0x6, &(0x7f0000003240)=[@ip_tos_u8={{0xd}}], 0x10}}], 0x4, 0x6049054) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) 18:34:41 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ae, 0x0) [ 1906.528846][ T3052] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:34:41 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2cf, 0x0) [ 1906.615842][ T3052] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:34:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:34:41 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x311, 0x0) 18:34:41 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getpgid(r0) r1 = gettid() syz_open_procfs(r1, &(0x7f0000000240)='fdinfo/4\x00') r2 = syz_open_procfs(r1, &(0x7f0000000000)='fdinfo/4\x00') preadv(r2, &(0x7f00000017c0), 0x3a8, 0x0) [ 1906.908753][ T3072] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1907.079924][ T3072] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:34:50 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x28000000) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000480)="2e0000002b008163e45ae08700000001120f0000000000bc4cc91b4dd65b2f0580cb7023072a556d1c958c000000", 0x2e}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.net/syz0\x00', 0x200002, 0x0) 18:34:50 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2af, 0x0) 18:34:50 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x312, 0x0) 18:34:50 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast1}, 0x3a) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40042, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = getpid() ptrace(0x4206, r4) ptrace$getregset(0x4205, r4, 0x2, &(0x7f0000000000)={0x0, 0x10}) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f00000002c0)) r6 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r6, 0x0, 0x7, &(0x7f0000000500)='eth1(.\x00', 0xffffffffffffffff}, 0x30) r8 = getpgrp(r7) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x81, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x3}, 0x0, 0x0, &(0x7f00000002c0)={0x5, 0x7, 0x7}, &(0x7f0000000340)=0x8d, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x4}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r8, r6, 0x0, 0x7, &(0x7f0000000100)='#wlan1\x00', r9}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f00000002c0)='em0@em0%.#\x00', r9}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r5, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)='GPLeth0\x00', r9}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r4, r3, 0x0, 0xc, &(0x7f0000000180)='/dev/uinput\x00', r9}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={r9}, 0xc) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000180)=""/101, 0x65) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000003280)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000700)="89e55c595fb90495e0ef0d9f92eb497deb0d2eccf41bd392cd40643422b543ac766a544f9619cbdccaf697bf175bdee8397cfd942a2f0369e952f1bfd8a2d6be19d009a1fe4618764bb7673ebc6957724ea1d4e5c8d621b8e46d36916df4dd18d31fa38ec721f3b55d55e74c63373673a68a76d83be31a493c3cb266c519574e754c4525e57e00735b57d9ae8b12dc3a933def296b29ee96a4670877929240069371dbdde6bcb26449d79f7cdcd191b3de28566aca272c64eb8f91410bf5474d500329986b4f9818b25aaac3b79fa0d6ed95d3e5735b07ab84816fc6bdfcd5d507c82b839af4d044e545bc93af6a7319b621ed6b22949cdc83097da0ecfe88f69afdd523df4397ea9efdf0274a7879e1deccfdb20a888df1eb82229d2cfbe8ba48321ae89ae653ceff588cad076fae42855a00181fc5df963b278462a89515dc40f64a3686b2cbdc5aa7cae62ee0c6b2326b00de1d597af3081c5c140b2de0626167b18439828795ff095290e0c6acd6204d66491f504f6de3d26a5c2dc45df575589207554c2a2b3f2967d8e3aec4e5090b7364c49fbf1736d216312b0d17e323f2b6b352660b821b6f43b34a60332f02892b42b45432d02f9f72f3ee4cffcf7b51ca92cb8814aa8368ffbb68276a10b2662b7df989d54849f2b3b0bd35208f4a4db9f13832a086919ac8f805ac8a188758871caf770456ecd3f9d06937a1e5a7bb0cd9b2f720c36390eaf76370a60e487520aa8440c653d25ce0dc7f589db280f6f7c5133c5211f575412453221eff47b791fff2611f012d905e3fa83b7fb211dfb5dfc1bfcfd1c1834cc259034ef63b9cf8f5b1c4fe2a1c45fab5818c1b4f978ec45f9821ee5be216bbef0055abcc6f9034a69f0d1554d6633e744524732241749dfd63ea2c19637b9282b80bac977173ecbd3659b5147d31e93f7aba6ddeb613ac71abdd150ace9e11d39a827f6684f7d77e8a731ff0f05201b0a72878064fa518f364a709902616ecd62a25bfa559f1290576e6d250e735cec4d5c075e05df78c11fcf9fc319f23a03ec39a70b4cd3976251b27c845ee9a115a8b46b21d8963356ed961db4e2d8b50d6a2fbeb800efe25d601df5b0c52f5d1f5ecaabef712720d8bf91c5878ae7d20977c202f8a4853db6b201be8d792643cff2029f725c7733b2bf4c3a50547e9230eaa1b5536d4ff4ad7745d9b53db3f2439c1e1f9e8f410bfd83849ae9c280c6c442dfb6dfa1c9441cfe82512dadd05b3e8ebe90ff4ff8a78cf8cf2dc15ad631146e3f366f97d418dbcc242816841e8dd3a18cde8ec8ebca9727001360fbb4818171f406c9f49b6f1cacb26d01e262bb31d017be5e1cd367b110111091ef942e2e17754ff9954b6ef3743b315ed639172199a881a35fdecf87f52a011117a4f0db27399a57eebd05c50b0bb103304b655cb4bdb7d93a683edc88b27aae4b5314d5bbbbe76b4a7b5a5eac20c320aeda07e3f22a1ca66d2d991f15f158ade7452b03a1d57bb705e3eef0714cf64a16b612ddecd9db079d70245149ec0a27a715b5d41abab417f7d4f8feaa3f91992d940ba8d464b01fdf1e1d8fdce9421ffe3c53687a968f0425e14bb4318fe9d81f909e9ec9ccbaeedf01459550b3a3608501f29070a09e857ab90896b30acf409a50ca2b98263a678d832214e7c921442ec8eab373d66c4238887b15b366e2c5254b6fd99a33b90032d0e158aecb981b334e21bb372ac48547102dd1b1f1666e08138b72705eb76400ef1b3522270cd7968f5132a2546208ca8eaaa2fd907b58f42638e886ce0775b919841082dc6c6dfd11589f04ecb41028b7e02773cab179a36b6e2f58433c5c55abfa80991cc9c5821da76a964e2462458fcdf08d731667213421785fa93371867ea4fec00110004c50ca0f1783d517db34e27613b6606901482b5e8885dc9cbe2b3bd694c7e47471d2a165c8831cc0ffb17b8d9dd2aa174f4b5bb2332675f02b46c9fb56070774bfe19a1660ccc56f741cc7f7970f412c96c8c1e4a30022fb0cbe6bc7e2ed6b13bf3c91a4cd5d7997b78230a96ac18e5ef8210c76d18374fb834485feaa4e50b555fc1fb2b951035ac976fddfeafff945fb8e8ca079d82a147deead16a0efb2b1344927e9b1b6ce4f3829bae7695a3d80e61462f2bf70d33af48525c1a31101771d75b7baec9d87fc11283630d2efee4ed0b84338a6b33ad0f380790038846c911dd1997594983cc1a7c49f7ecbda7b900ea93f411327f184410517b31a9e943e1c120f48a1fa01123e8c43affa8114404ba1ad7ecccf6d1f801a016b389e54abbc261de71a7fe127081879d80757e8935e79b6939fd53989ee98d0818ef680816c6a5efd97aeed7bd41a373b485c512e3ac2cf76e04bc452df987e01d3a126e8324cacec9f57281adff5ad15f7848688a7cae566098d6d48b5c5021d92bcd17c8b5b99871d50979adcdf08c78e84167045e49ad98f643fe26c0f1c4e939e607e47ee2efd51085da4dd8685501160205d11fe74c01ffc2e5bc26a4ea2a08a9e6c49c0d7d6d91bb31bb36faad93885e636b27d5f41eea59dcadcf270d4fc7b0b119d02738a537b4881f111522af1aef264b4a95409d45c0c3db0c309c1a5c8a2022f5fdbd1957520bc02ebb8055385e7886454fa8616a97fca3bc2acd68c66ef0161a440a26b80ef85c760317525ea0808172a45763a46cc46c3029912f4c11d7aa0f5e45ce1c4477f09ac895df4a56da1b59dd2bea6cb2063fa7909073c685c9d7ef4d1d70ac553af97c21e91b8440a38306dab25627bf3e6360bdc31ddebf8f85b4930adf9264e6d0a2152aff03cc410c7e71dccbd8350b2d196da5ece8608c661e00b0ba644c3a3ff2406a35dd4bb073709c2c20d74036a53494e784d8c83ef99a3a3321d8993e5de0313a9643ed9869d4647a96a4e174650496e4527994b3c22c2201892f2006741cad26bc4e5b0f6a019a2ed527d9fc6709e37f30ab45026bdec9305c0a29b44676baa631be349882692529b5278b0254138bd5b16550cf50e1c0fe7239ea580e261f37fc67ab5bfc9a4dce765a651d31630606a09928b25e9a0afea0e6718641b627164ed60611c13e036f774d3488884116f93ec88d389c3c4d674b8b7ed6ef04e29038840a8a84f2c639ea677d4e3b9a92d57201cffc65e4e54b5954392fbfebfe3d399c67f477211ecd08322b03cf5daa2d1a670be208b16e4a56b9b0f24dd18c212bb2fa433992156eb476aa7a34c6", 0x901}, {&(0x7f0000001700)="1c", 0x1}], 0x2}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000002440)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000002840)=[{&(0x7f0000002480)="e60b2ca635608c31af2dc627f8030b43760532dd8a2a25521f91e36c40cada25a3f2ce58eebeaf123f8a907941d89ca98cbdee746666b7d1a2e909dd1582e0139167ca6b73cd22b4b73a26a0c53a35f0a6bdb305d521b6f28f4135cf0ca291cb01490e3601001c48c53315b31a13b1732d53bfdcb839b8b77eca8fc9", 0x7c}, {&(0x7f0000002500)="3c5608410d473e765b7e68b896f222aa55499dff49895329309fe473a0250e9dca9268721ecb5283009b5ac50818c7", 0x2f}, {&(0x7f0000002540)="98b164dee629c2fb7412159fc6a32278341ad047fa3562186880ec869aac5b492058eaacc7aa97244ac9a3b38e238bf57275114577a97938b31327a624779062abc128fb89c510d8cd470a188517ce1f94af3d7c3422fd018aed9b2b565a057be32870fbe434ff5b1534c486343287644c2aec5eb23e331724b8559adb5488ce5e3a7fed66f3467cb6f2ae4306497bedc1c54d9bfcbfc2c3c3e7b20da98a5b42ec6afeeeb79a7fd34ececf8dee9fea56aaa7950473abde42fd5ffeb8eafb40c6", 0xc0}, {&(0x7f0000002600)="bbb32924aa64d94d458f1cddd5cad6f9d604eb65fc1af16ed21b11422abc9eea5d071acbda18a68a6fd9f711eae3265544880d8b3c28eb61eef0b19448ed36894478eabd4404f5ba299476ec3989e641739ab6f7a7", 0x55}, {&(0x7f0000002680)="90246b5cc5b5de16ca59d952bd0ff80514b6b4b0dd4aa87838c080f0ef132851fb7a09d4bb97791e819f47fc298505aa1979654470c98ec4d533ec243bfba56b4b", 0x41}, {&(0x7f0000002700)="714cf4d32ce7d1a3930c48cb60b5bd8b24eb3468d021fdc1a3da9fc100245f80a99273e0a47f6e5956c6e56c0aa3fd619a8c4d19ae6bafd3193570857ee9ae405824ded162d8e1f3383a3628e4b92671666e92a05f7be84aac9a76c7d29932", 0x5f}, {&(0x7f0000002780)="8732c029c6ca6f256a9fc8930f9e329530fc136ac668af3add1b26e139a89bc33f3d608dd58d4e06f706f1b32ea2a9f42711b880bcd10501b96bc5a4c99dce9ee9fb76fb7a9ccc71f8f70480bcb3de5624388961c1aff15ab80fcddb08a33ff8659e7a2b5235c236c7ea2fbf61c26407c3255540b458ba76a5ea27be0cfd4edd9332cc62f020d462", 0x88}], 0x7, &(0x7f0000002880)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @dev}}}, @ip_tos_u8={{0x11}}], 0x38}}, {{&(0x7f00000028c0)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000003200)=[{&(0x7f0000002900)="e90b14f8cf650d1106ac7cd6e0307ab8210c6c7e524f23af54f21fa4b9584ef9a60d6aee8c908134600d5cb548a2747c88a1603f880a96b7ced507625a0584d5e27e25d6627e3ebea1", 0x49}, {&(0x7f0000002f80)="8e84937a445fe15efdfc052096611a75e6e4fe5dddef287b057a1d1bddfd6d141d6307b0421fa1e82121705c266a6011da392050985135b804af7b0e718e13f316c953ff9020d4d14759648f1f487634ed6f22d9bc9a2b70b0e1ffc1828aecabdfebb3856b14caa7fe9fe9b9dd6e16f23ba265914f4fb3a49a0640028c7e03f1202d6f0b8f71600114c31fcff6e17432d8badaed2d48c0c4a23e112d8c8973b6fabc5bc3e4e84ba8b7b2e82da8afc362a00761f69de7e48fa1699d4c98b272a3e795a7b406f803190d851abdee5154f50ea0b16ba73435be7acd59f86beb6c", 0xdf}, {&(0x7f0000002980)="9f4a222c12140705f6c5a4299b208a7c8f98b78446cc8b388ef5291acadb8e41d62869efc7f137183ccae38d88f7afaf82551e1ffea25f215b85ca29d5fb1a665357b3a4d59485a8777fb5694a87c38812dac9788f27670a", 0x58}, {&(0x7f0000003080)="4b483173b21b1388d3885e9cbed6ed74df21b45291b19dac2a979ba3e18c797fa8cfa8f41635ec48e205ca3944f19ef418bae8bf4ab11c35a5f2e5cee0d89254a1ad5353c977f3df5547b9954e35e3ab80a615aaa1e94111902accc6b98dbd9e94ca70a9d33476ba9f40b8c923fbc50ce3aeab405b7e0ab43fa05b7692ba8b6da11561dccb5a97b8d3afcebe61ca5fb19f7598f9274a006f7c9eee41cc91180ccbe486c27191d13f0ae8831e1311f53498a1b0ae2b", 0xb5}, {&(0x7f0000003140)="11b92f8648741ca2c55608cb8a72783105958aff7b0b8b89b63706a9f18bc0347de89657442943765f6369272a67a4628a9d51f282d1b078e9cd8f536860fa641e92612506ddd78c111f932a37059b7b2ab71832fdc29e86bcada337f888fe92aeaaebdcdb7c774103bfaf38e60cf5fc8d899497a90222db991db68df27413dc715d0a45565fce9b622cd84bc6fbf43bd68e13073e3cfefcb5b3888d73191044", 0xa0}, {&(0x7f0000003ac0)="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", 0x1000}], 0x6, &(0x7f0000000140)=[@ip_tos_u8={{0x11}}], 0x18}}], 0x4, 0x6049054) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000000)={{0xb768a9c649414a4c, 0x0, @descriptor="88e8f6c76515b085"}}) syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) preadv(r10, &(0x7f0000001280)=[{&(0x7f0000001540)=""/180, 0xa0}, {&(0x7f0000001300)=""/125, 0x7f}, {&(0x7f00000010c0)=""/148, 0x94}, {&(0x7f0000004ac0)=""/4096, 0xfffffffffffffe78}, {&(0x7f00000006c0)=""/37, 0x25}, {&(0x7f0000001180)=""/208, 0xfffffffffffffcd6}], 0x6, 0x0) 18:34:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:34:50 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d0, 0x0) 18:34:50 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b0, 0x0) [ 1915.548034][ T3111] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1915.669660][ T3111] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:34:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0xa, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:34:50 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) rt_sigqueueinfo(r1, 0x2b, &(0x7f0000000000)={0x1d, 0x8, 0x3f}) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) [ 1915.989789][ T3132] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:34:51 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x313, 0x0) 18:34:51 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b1, 0x0) 18:34:51 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d1, 0x0) [ 1916.097747][ T3132] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:34:59 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x28000000) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000480)="2e0000002b008163e45ae08700000001120f0000000000bc4cc91b4dd65b2f0580cb7023072a556d1c958c000000", 0x2e}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.net/syz0\x00', 0x200002, 0x0) 18:34:59 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') r1 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0xc05c6104, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) r8 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r8, 0xc05c6104, &(0x7f0000000000)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r8, 0x84, 0x65, &(0x7f0000000900)=[@in6={0xa, 0x4e24, 0x0, @remote}, @in={0x2, 0x4e22, @broadcast}], 0x2c) write$sndseq(r0, &(0x7f00000003c0)=[{0x2, 0xc4, 0x8, 0x66, @tick, {0x91, 0x80}, {0x9, 0x80}, @time=@tick=0x1e6}, {0x4, 0x3, 0xaa, 0x8, @time={r2, r3+30000000}, {0x9, 0x7}, {0x5, 0x1}, @ext={0x2b, &(0x7f00000001c0)="4c971492f6ac1457a8a9d0e3518415b39bf18d32d0e47eb9a916c0b545548bd09a0635cdd618dd182e8937"}}, {0xfc, 0x3e, 0x0, 0x3, @tick=0x4, {0x6, 0x9a}, {0x9, 0x9}, @raw8={"1606e86ef83d508debb12f2c"}}, {0x3, 0x8, 0x0, 0x96, @time={r4, r5+10000000}, {0x8, 0x3}, {0x5, 0x2}, @note={0xff, 0x5, 0x57, 0x1, 0x8}}, {0x8, 0x4, 0x50, 0x3, @tick=0x8, {0x0, 0xff}, {0x40, 0x3f}, @control={0x7f, 0xfffffff9}}, {0xb7, 0x4e, 0xf8, 0x9, @time={0x77359400}, {0xef, 0x3}, {0x1, 0x9}, @addr={0x4b, 0x6}}, {0x9, 0x5, 0x7, 0x6, @time={r6, r7+10000000}, {0x0, 0x6}, {0x3, 0x9b}, @connect={{0x8, 0x3}, {0x71, 0x2}}}, {0x2, 0x7f, 0x81, 0x7, @time={0x0, 0x989680}, {0x6, 0x4}, {0x2, 0x3f}, @addr={0x1, 0x85}}, {0x9, 0x1, 0x43, 0x6, @tick=0x3, {0x8f, 0x2}, {0x20, 0x4}, @ext={0xd9, &(0x7f00000002c0)="fc54c3677927b29806ebbb282ad58d2f5bf42b97404b9101b12492afaf2646fca34638eb5061d09c2876058b2205962cb2906314c07eebf37941f90f28f5afc06ecb21815107ddeab9c7cd24bc53c430a97eefbecde36b751ec402d29ce4db190fde75e1050859bcef105cfbb58640760d1f95db29688a81b1f0b2a28ca6120c8b1414a74b8557420aaecbac860cc82ed34e14ff7ad466480e492f03f295f14e1260d3a20d8de5b81912870526c02df4190a8df7668accb81cd641fe16e3e887dd38faf8ba32af8b170c30339b4ebfcfecd413e8a99d2dfd7b"}}], 0x1b0) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000000)) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) execveat(r0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), &(0x7f00000007c0)=[&(0x7f0000000600)='proccgroup-:\'$\x00', &(0x7f0000000640)='stack\x00', &(0x7f0000000680)='stack\x00', &(0x7f00000006c0)='stack\x00', &(0x7f0000000700)='stack\x00', &(0x7f0000000740)='stack\x00', &(0x7f0000000780)='eth1[ð0vboxnet1\x00'], 0x1000) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_IPV6_XFRM_POLICY(r9, 0x29, 0x23, &(0x7f0000000800)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000005c0)=0xe8) 18:34:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x10, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:34:59 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x314, 0x0) 18:34:59 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b2, 0x0) 18:34:59 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d2, 0x0) [ 1924.922386][ T3189] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:34:59 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b3, 0x0) 18:35:00 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) [ 1925.055330][ T3189] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:35:00 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000040)={0xf70, 0x6, 0x7, 0x2f}) 18:35:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x23, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:35:00 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d3, 0x0) 18:35:00 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x316, 0x0) [ 1925.380276][ T3221] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1925.489453][ T3221] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:35:06 executing program 2: io_uring_setup(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) getpid() r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x8000) 18:35:06 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b4, 0x0) 18:35:06 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x40002) 18:35:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x2d, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:35:06 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x317, 0x0) 18:35:06 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d4, 0x0) [ 1931.208227][ T3261] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:35:06 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x318, 0x0) 18:35:06 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x400100) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x1000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80}}}, 0x30) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) 18:35:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x48, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:35:06 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b5, 0x0) [ 1931.618222][ T3286] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:35:06 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d5, 0x0) 18:35:06 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast1}, 0x3a) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0xc05c6104, &(0x7f0000000000)) bind$llc(r1, &(0x7f0000000200)={0x1a, 0x30c, 0x6, 0x40, 0x6, 0x3, @dev={[], 0x2b}}, 0x10) sendmmsg$inet(r0, &(0x7f0000003280)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000700)="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", 0x901}, {&(0x7f0000001700)="1c", 0x1}], 0x2}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000002440)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000002840)=[{&(0x7f0000002480)="e60b2ca635608c31af2dc627f8030b43760532dd8a2a25521f91e36c40cada25a3f2ce58eebeaf123f8a907941d89ca98cbdee746666b7d1a2e909dd1582e0139167ca6b73cd22b4b73a26a0c53a35f0a6bdb305d521b6f28f4135cf0ca291cb01490e3601001c48c53315b31a13b1732d53bfdcb839b8b77eca8fc9", 0x7c}, {&(0x7f0000002500)="3c5608410d473e765b7e68b896f222aa55499dff49895329309fe473a0250e9dca9268721ecb5283009b5ac50818c7", 0x2f}, {&(0x7f0000002540)="98b164dee629c2fb7412159fc6a32278341ad047fa3562186880ec869aac5b492058eaacc7aa97244ac9a3b38e238bf57275114577a97938b31327a624779062abc128fb89c510d8cd470a188517ce1f94af3d7c3422fd018aed9b2b565a057be32870fbe434ff5b1534c486343287644c2aec5eb23e331724b8559adb5488ce5e3a7fed66f3467cb6f2ae4306497bedc1c54d9bfcbfc2c3c3e7b20da98a5b42ec6afeeeb79a7fd34ececf8dee9fea56aaa7950473abde42fd5ffeb8eafb40c6", 0xc0}, {&(0x7f0000002600)="bbb32924aa64d94d458f1cddd5cad6f9d604eb65fc1af16ed21b11422abc9eea5d071acbda18a68a6fd9f711eae3265544880d8b3c28eb61eef0b19448ed36894478eabd4404f5ba299476ec3989e641739ab6f7a7", 0x55}, {&(0x7f0000002680)="90246b5cc5b5de16ca59d952bd0ff80514b6b4b0dd4aa87838c080f0ef132851fb7a09d4bb97791e819f47fc298505aa1979654470c98ec4d533ec243bfba56b4b", 0x41}, {&(0x7f0000002700)="714cf4d32ce7d1a3930c48cb60b5bd8b24eb3468d021fdc1a3da9fc100245f80a99273e0a47f6e5956c6e56c0aa3fd619a8c4d19ae6bafd3193570857ee9ae405824ded162d8e1f3383a3628e4b92671666e92a05f7be84aac9a76c7d29932", 0x5f}, {&(0x7f0000002780)="8732c029c6ca6f256a9fc8930f9e329530fc136ac668af3add1b26e139a89bc33f3d608dd58d4e06f706f1b32ea2a9f42711b880bcd10501b96bc5a4c99dce9ee9fb76fb7a9ccc71f8f70480bcb3de5624388961c1aff15ab80fcddb08a33ff8659e7a2b5235c236c7ea2fbf61c26407c3255540b458ba76a5ea27be0cfd4edd9332cc62f020d462", 0x88}], 0x7, &(0x7f0000002880)=[@ip_pktinfo={{0x18, 0x0, 0x8, {0x0, @empty, @dev}}}, @ip_tos_u8={{0xd}}], 0x28}}, {{&(0x7f00000028c0)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000003200)=[{&(0x7f0000002900)="e90b14f8cf650d1106ac7cd6e0307ab8210c6c7e524f23af54f21fa4b9584ef9a60d6aee8c908134600d5cb548a2747c88a1603f880a96b7ced507625a0584d5e27e25d6627e3ebea1", 0x49}, {&(0x7f0000002f80)="8e84937a445fe15efdfc052096611a75e6e4fe5dddef287b057a1d1bddfd6d141d6307b0421fa1e82121705c266a6011da392050985135b804af7b0e718e13f316c953ff9020d4d14759648f1f487634ed6f22d9bc9a2b70b0e1ffc1828aecabdfebb3856b14caa7fe9fe9b9dd6e16f23ba265914f4fb3a49a0640028c7e03f1202d6f0b8f71600114c31fcff6e17432d8badaed2d48c0c4a23e112d8c8973b6fabc5bc3e4e84ba8b7b2e82da8afc362a00761f69de7e48fa1699d4c98b272a3e795a7b406f803190d851abdee5154f50ea0b16ba73435be7acd59f86beb6c", 0xdf}, {&(0x7f0000002980)="9f4a222c12140705f6c5a4299b208a7c8f98b78446cc8b388ef5291acadb8e41d62869efc7f137183ccae38d88f7afaf82551e1ffea25f215b85ca29d5fb1a665357b3a4d59485a8777fb5694a87c38812dac9788f27670a", 0x58}, {&(0x7f0000003080)="4b483173b21b1388d3885e9cbed6ed74df21b45291b19dac2a979ba3e18c797fa8cfa8f41635ec48e205ca3944f19ef418bae8bf4ab11c35a5f2e5cee0d89254a1ad5353c977f3df5547b9954e35e3ab80a615aaa1e94111902accc6b98dbd9e94ca70a9d33476ba9f40b8c923fbc50ce3aeab405b7e0ab43fa05b7692ba8b6da11561dccb5a97b8d3afcebe61ca5fb19f7598f9274a006f7c9eee41cc91180ccbe486c27191d13f0ae8831e1311f53498a1b0ae2b", 0xb5}, {&(0x7f0000003140)="11b92f8648741ca2c55608cb8a72783105958aff7b0b8b89b63706a9f18bc0347de89657442943765f6369272a67a4628a9d51f282d1b078e9cd8f536860fa641e92612506ddd78c111f932a37059b7b2ab71832fdc29e86bcada337f888fe92aeaaebdcdb7c774103bfaf38e60cf5fc8d899497a90222db991db68df27413dc715d0a45565fce9b622cd84bc6fbf43bd68e13073e3cfefcb5b3888d73191044", 0xa0}, {&(0x7f0000003ac0)="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", 0x1000}], 0x6, &(0x7f0000003240)=[@ip_tos_u8={{0xd}}], 0x10}}], 0x4, 0x6049054) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) process_vm_writev(r2, &(0x7f0000002480)=[{&(0x7f0000000040)=""/180, 0xb4}, {&(0x7f0000000100)=""/69, 0x45}, {&(0x7f0000000180)=""/5, 0x5}, {&(0x7f00000001c0)=""/61, 0x3d}, {&(0x7f0000000280)=""/92, 0x5c}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000023c0)=""/172, 0xac}, {&(0x7f00000027c0)=""/4096, 0x1000}], 0x9, &(0x7f0000004880)=[{&(0x7f0000002540)=""/254, 0xfe}, {&(0x7f0000001300)=""/77, 0x4d}, {&(0x7f00000037c0)=""/4096, 0x1000}, {&(0x7f0000002640)=""/84, 0x54}, {&(0x7f00000026c0)=""/144, 0x90}, {&(0x7f00000047c0)=""/131, 0x83}], 0x6, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r3, &(0x7f00000017c0), 0x3a8, 0x0) [ 1931.748424][ T3286] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:35:15 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x319, 0x0) 18:35:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x3dc) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x663abba741622feb) ioctl$KVM_NMI(r2, 0xae9a) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) 18:35:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x4c, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:35:15 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b6, 0x0) 18:35:15 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/122, 0xff0c}, {&(0x7f0000000080)=""/232, 0xe8}, {&(0x7f0000000280)=""/249, 0xf9}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x4, 0x0) 18:35:15 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d6, 0x0) [ 1940.539571][ T3328] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:35:15 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) r1 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0xc05c6104, &(0x7f0000000000)) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000180)) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x880000, 0x0) r3 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0xc05c6104, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000040)={0x0, 0x91, "b49782da1c682a4a5d8ae5beb6854dd9ac3d6a5e72c14bde1f64f9ff9b55bbf57709cd43002eade31cc183af4b2e00d2fc0f2774f7e0ccd42dbb5080f2e8e3ebe9b8890e3513c886bd916561c5d393ad65606631e615fce1c864e7647b1377dc98544b4bab7c0705be8861c61c4f37da0d2090bc0c221efb3bb233af11cd3c7f342de15303b055011f769fa322f290dde7"}, &(0x7f0000000100)=0x99) r5 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r5, 0xc05c6104, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000140)={r4, 0x3, 0xf, "fb8876456ef7960fcb02e0d7555248"}, 0x17) [ 1940.654079][ T3328] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:35:15 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x31a, 0x0) 18:35:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x60, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:35:15 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b7, 0x0) 18:35:15 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x50000, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000100)={0x9c0000, 0x3f, 0x207, [], &(0x7f0000000080)={0x9b0908, 0x3, [], @p_u8=&(0x7f0000000040)}}) 18:35:16 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x31b, 0x0) 18:35:16 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d7, 0x0) [ 1941.098112][ T3372] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1941.210546][ T3372] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:35:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x68, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:35:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) 18:35:22 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) r0 = gettid() syz_open_procfs(r0, &(0x7f0000000240)='fdinfo/4\x00') getpgid(r0) r1 = gettid() syz_open_procfs(r1, &(0x7f0000000240)='fdinfo/4\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x20400, 0x0) perf_event_open(0x0, r1, 0x7, 0xffffffffffffffff, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x3a8, 0x0) 18:35:22 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x31c, 0x0) 18:35:22 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d8, 0x0) 18:35:22 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b8, 0x0) [ 1947.681984][ T3403] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1947.807146][ T3403] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:35:22 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @multicast1}, 0x3a) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r1, &(0x7f0000003280)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000700)="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", 0x901}, {&(0x7f0000001700)="1c", 0x1}], 0x2}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000002440)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000002840)=[{&(0x7f0000002480)="e60b2ca635608c31af2dc627f8030b43760532dd8a2a25521f91e36c40cada25a3f2ce58eebeaf123f8a907941d89ca98cbdee746666b7d1a2e909dd1582e0139167ca6b73cd22b4b73a26a0c53a35f0a6bdb305d521b6f28f4135cf0ca291cb01490e3601001c48c53315b31a13b1732d53bfdcb839b8b77eca8fc9", 0x7c}, {&(0x7f0000002500)="3c5608410d473e765b7e68b896f222aa55499dff49895329309fe473a0250e9dca9268721ecb5283009b5ac50818c7", 0x2f}, {&(0x7f0000002540)="98b164dee629c2fb7412159fc6a32278341ad047fa3562186880ec869aac5b492058eaacc7aa97244ac9a3b38e238bf57275114577a97938b31327a624779062abc128fb89c510d8cd470a188517ce1f94af3d7c3422fd018aed9b2b565a057be32870fbe434ff5b1534c486343287644c2aec5eb23e331724b8559adb5488ce5e3a7fed66f3467cb6f2ae4306497bedc1c54d9bfcbfc2c3c3e7b20da98a5b42ec6afeeeb79a7fd34ececf8dee9fea56aaa7950473abde42fd5ffeb8eafb40c6", 0xc0}, {&(0x7f0000002600)="bbb32924aa64d94d458f1cddd5cad6f9d604eb65fc1af16ed21b11422abc9eea5d071acbda18a68a6fd9f711eae3265544880d8b3c28eb61eef0b19448ed36894478eabd4404f5ba299476ec3989e641739ab6f7a7", 0x55}, {&(0x7f0000002680)="90246b5cc5b5de16ca59d952bd0ff80514b6b4b0dd4aa87838c080f0ef132851fb7a09d4bb97791e819f47fc298505aa1979654470c98ec4d533ec243bfba56b4b", 0x41}, {&(0x7f0000002700)="714cf4d32ce7d1a3930c48cb60b5bd8b24eb3468d021fdc1a3da9fc100245f80a99273e0a47f6e5956c6e56c0aa3fd619a8c4d19ae6bafd3193570857ee9ae405824ded162d8e1f3383a3628e4b92671666e92a05f7be84aac9a76c7d29932", 0x5f}, {&(0x7f0000002780)="8732c029c6ca6f256a9fc8930f9e329530fc136ac668af3add1b26e139a89bc33f3d608dd58d4e06f706f1b32ea2a9f42711b880bcd10501b96bc5a4c99dce9ee9fb76fb7a9ccc71f8f70480bcb3de5624388961c1aff15ab80fcddb08a33ff8659e7a2b5235c236c7ea2fbf61c26407c3255540b458ba76a5ea27be0cfd4edd9332cc62f020d462", 0x88}], 0x7, &(0x7f0000002880)=[@ip_pktinfo={{0x18, 0x0, 0x8, {0x0, @empty, @dev}}}, @ip_tos_u8={{0xd}}], 0x28}}, {{&(0x7f00000028c0)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000003200)=[{&(0x7f0000002900)="e90b14f8cf650d1106ac7cd6e0307ab8210c6c7e524f23af54f21fa4b9584ef9a60d6aee8c908134600d5cb548a2747c88a1603f880a96b7ced507625a0584d5e27e25d6627e3ebea1", 0x49}, {&(0x7f0000002f80)="8e84937a445fe15efdfc052096611a75e6e4fe5dddef287b057a1d1bddfd6d141d6307b0421fa1e82121705c266a6011da392050985135b804af7b0e718e13f316c953ff9020d4d14759648f1f487634ed6f22d9bc9a2b70b0e1ffc1828aecabdfebb3856b14caa7fe9fe9b9dd6e16f23ba265914f4fb3a49a0640028c7e03f1202d6f0b8f71600114c31fcff6e17432d8badaed2d48c0c4a23e112d8c8973b6fabc5bc3e4e84ba8b7b2e82da8afc362a00761f69de7e48fa1699d4c98b272a3e795a7b406f803190d851abdee5154f50ea0b16ba73435be7acd59f86beb6c", 0xdf}, {&(0x7f0000002980)="9f4a222c12140705f6c5a4299b208a7c8f98b78446cc8b388ef5291acadb8e41d62869efc7f137183ccae38d88f7afaf82551e1ffea25f215b85ca29d5fb1a665357b3a4d59485a8777fb5694a87c38812dac9788f27670a", 0x58}, {&(0x7f0000003080)="4b483173b21b1388d3885e9cbed6ed74df21b45291b19dac2a979ba3e18c797fa8cfa8f41635ec48e205ca3944f19ef418bae8bf4ab11c35a5f2e5cee0d89254a1ad5353c977f3df5547b9954e35e3ab80a615aaa1e94111902accc6b98dbd9e94ca70a9d33476ba9f40b8c923fbc50ce3aeab405b7e0ab43fa05b7692ba8b6da11561dccb5a97b8d3afcebe61ca5fb19f7598f9274a006f7c9eee41cc91180ccbe486c27191d13f0ae8831e1311f53498a1b0ae2b", 0xb5}, {&(0x7f0000003140)="11b92f8648741ca2c55608cb8a72783105958aff7b0b8b89b63706a9f18bc0347de89657442943765f6369272a67a4628a9d51f282d1b078e9cd8f536860fa641e92612506ddd78c111f932a37059b7b2ab71832fdc29e86bcada337f888fe92aeaaebdcdb7c774103bfaf38e60cf5fc8d899497a90222db991db68df27413dc715d0a45565fce9b622cd84bc6fbf43bd68e13073e3cfefcb5b3888d73191044", 0xa0}, {&(0x7f0000003ac0)="69115ca672bf74bcdefda07a61e56172262a48ad0515c8b7dfcbadf111e50ff19ac9e47e4ff88f8e97f3e1e91f7fe79ffa604b98fa84935004425ca9e66c774ad5ff6356deb49196c56833d971d07eb2b2609c88f981febc419c5fbe1a00ce8bc230409e7fa74f9c6d0aeedd6becba70e26e751ccb6528f60f2d800f5f159436f39dc7a33dfc5a1f9c51a692b93897f51b71021894ca55720ad9950fd99748171f4c7a3c9ce427f3e7f2b28226763299661bcc81002832a90fbacfbc1fc2f74350c1f3ecb951973ce50e20f2ed599fe20319a55f05cafa6f5fbb3b2a14fb30e9b6f32fcc4bb194371ce04a27b7b105e3b3bdd51538e6e9f0615ea1c56ccbfef61ed8eff24a45e6263ba887a2e4cd73ab0a3ffed1859373c74e909a4da5f9810553b2a4c855d5bdbcce15b8f6d417b048358b67d9960ae04fd84910168f1165b57fd2f2a03aa7d7e61a7b353cfe2e250d980ae30fd784ca3b37afaa45699c9c446c3f1d3b1cc3f1a78f7513195d5bb998afbef54d822d5390f8eb15a21d0b4730039cfae3bde0c704c269c439e20ee45298befd7843b3945346e651150f5726d8c1ad890fe4785117e49caad519c11b672a3141afd53e95d61fe0755394dfa6b9e1da376f465630fe34823201c1b44cf7be5b4c7ca2f158412d70ce5470d5eff7272d5c1bbf6934229ac65f9db5b24d236c88a3a7b61941e7a07cdaae4549122ae9909562275779142766f91def24e330f3e07776aef7e81e1fc3a619508fb8508687b740d44543acad5b8697db2f8e19ae55d58061738b4aaf422895673221f59e9559033bc3e22c16d33e4bed1d246cf4bcd1ef55ed30655a338c7a520c7b8f1ff5b055cf4c41a838d82a0b2bca0ec26fb4ec2250e57bd1723c6725fe6d4c5361933c444511bbeb84d9d5342104ab42914e35f4675131cb461f12aba55a59b952fb15dc2dd4495abc7abfc3e58d09d8385e358390e23592b3435bc5d6e84dde976bcfc05725da03e00dbee0404e50882857f703d56e4d402cb491911756eb3f9486ff8a79fd10f492d302878c07cb0b682945f1e614db3efb2fd53935feca6c6fe7c5408cde0d29da53ff012578e37945b511968a5a0189cef72318dfe76734f2e7cd31c84633cd2c3fb69472ef71bc6a2ce7bc0acfb5a268e9869b920c18440cdd222132f6aba72bf96adf466c15d4b374aa91e925b3438ab798ab17eb134345e4ae1b353c146b0ee1d57147c6b785ce1dc636e943139039d225cf05acd06275137c41f70da249e62b323c3caeb582dfc96dd24e2561933594f0644686b92a1484ee6f9c3f384c477c5c11d9ca68f1c3350bec60f80f800966c0295f81d17517569952478189c408c65cb9208f80fc9c8cb852eeabb5d2eff6afdbec887f5325223ab4e49c730fa9f1ed74a0fca883fe91ff423d0d5057dae4e812deb3e08db8f239296a382cbfdba605effa5065f49eb0969a7e21b42c0950a693e1cc32c4547d2558ecbb58350b00f8e5cc2cde26903e646f222087613efa94266962e798e9c748a6253ef14f69c8873b4de02f84cdb085d93b73dd4b2406a8b0295997ff6448d6d2e96239daaa83d588d0fa1c0723bc5a5d131d5a332eb5fa2600ff163e0d865e9b7b2cf0c1ebbf6a00fe93c67eb74a93deb58358518c0ec0996e5da4531839cda8953151776773dfdd826bf3ade6e673445dcca4927fd4f6ae1d545987e6748bda39a2a048583372ebf46e44402a0478e937c252fc0170eb5a266de3e290d8d1fd64a99739acc42ad1df97ca10a25b17a1061668ba2fbc9c93cff9b5fb7f136e2c1786680cd29aa7cd9fe88b18ebee75c90b9fcbdf03366bdbd7482efc606e71eebf5824953ac831e7e231555a1c4b81fac73afb84e99d920f3bb86c73ac8fc9dd6d33141a344182202e346e4fc22fb82fbb017ded7e3f01bc39184d9f6b92f011b7499cb89e2307ce280cd3ddb576de612ceaec07d1cd9bb570372e0eeef0ed22a346eb8673e5496d1671bb806af443696a30cf58aa715bfc0c16d8d25cda6cc5d4602a834bf6ee0706843258c8c2cbb6cd4975dc2f001ff7c995ae39929401a9807137b37355453d74d5da28a5adaa741e4c33da1b7d037798c4d0b954a74570f6da0c392834ac2709dbf0c2acfdab2023c53dcccd9d29705899c2df9591cab4e13e62af368bcd765e37eb79318a00ce252707727392c3064f705ea36f8440bd4b9564d4a65fef8c6a5744cb8919c05f99742b138be9a41e6f62847b7d560065963a4aa476d712330be43b6a05abd206ebbd8befff1d5361d30ec12742fb582267e7c15893842efc0c9e0deb50022d6e336c76a60945b7e89a5ad1275bdacecb1c851ff708cab268e14f5ebf4d526010432ba82981070bb3d0fd0aa548b29b69a85c80382131ada9dd3b9ba583e1b3a738b2ac4f89f3a618609e8396a09e95b41907241f5f0488eff1e69dd1f5ecf115c6daa566696e7b453d8b13e7ae034825a10e0e1e9a857e010a5e428804e786fbf34f2c9947e8ce1a85ae2f08fb79a64152753da440ad7aabdb4c47a8c508d5288186d0e2832d39ebcbb7bfd1edbc653971c56f60a5e57eb77593b188a7e76d78809e92654492b915f94d39d4a35b17240930aed8d8b6bb83b6397327d694f8077cfef57961126ae12dc1dfbb7d73d8e98d53ca5d89a6eaf2495f27ac15b8c564c133c7c48eff5f05443b9b6d59c1f0ecc75801b06e3a2c9a1af0b5ed73dcd49605170909959bdaee204dc20b4e1630ce435746dc6b032839e83e4ccdd400e1566a2549ff7723ede6c12adb073773f36af0d56b4b7291c1cf25337b380d7f00c19e050ef6edfab9f92720f48cc2e30f955cb261184bb3db92b7f90c7ddcf26cb3567167b890f5828a18e3309f6271ad5a5c1ed2778f36efd59eb706f7cbc62f748ac7516ca55fa444418985d93dc7b25599b9394438c86baec0a6e0647e97318386a4a08bdea95c167b454d0530ed5864528dd7ba9af1b9c3f0e910e5d24f7b3bea46fd7b750126131d781808b8a149d945deae2c042e89c819183b10467d42fd1194c53df04cad3a63a7029631557510fa25076d237e8bca5c8906248619208a61f36c8d9912589cfc9f6b324473416ad050bc7fe1a7cee6d25bb8c7b7211c1b8bcf4645f9be64fc48aa658fc92c22493e2c7edd83a51ffa85ce162b0964e226d7667b74902a7a5c2af65bd612db4a1c46bdfd17c0a0629b4885df41de23f352c004dce21f5767ac8fc19e5430775b140fd7a988ea3d9e5fc6b488b4811619e60d096d5c6a364e5073224ea796607a497baee7b1712d4e962ade5b7ac62fdc79303e1fa3b2b40ea839d38e8f67c7bdd39294c33a105cab6774bece52edb6e84cb37e261ea3690c3f711ff10b5f7890cdb027eb3d29f0ac025f6421de118ec9ca6016c131593d195480d8ea29ccabb6b4c380f46b226e0422cd1530aa7e9fcef5ae8c8b4c00dd938418965eaa809d3e29bb0fcb444355960fd570c642c73d7bbe69c6c91d924b89fca7b117353b900baa6e562dd0ebe4b1ae5b6f577b478e91e47c06f10ddce2aa6436213b6fecf951a97ed816e9aebdc4944cdfe4ceb3e771503450c792b29a8e82e80a902e580ef137aa06e047e647914feadc8e725411cec53a59d621abd824608aa1bbc028748109bb7854e0ee2c057384ef5a5b269622194e8aa4d5ab2b2675b61f6a1e5ed5c4382b91566b568e46c5a245506a81d47a1444f94d543093e6c44aa55d30c39b11456a86f5b655933eabf67817bcd28fed1a950293909ccd35ed8ce53d5fa5c3e46383995bf9fac4ecd9fa613c69c0fe2f3d58640bd3147f857f681b1a6197d60320838547263eb9a1836e287c30f9fbd82870b88b41456a68b387ee787fe31117c09c17f2cd4c1b14a314e3c25db37d8e1c3f34931d1d991e14565e0588d1bc9e8b0a8474148b67ad07ed3d45c2890d84b39deb66b0fc0759c033b7122942f55142a1f0d0a839808060dea0d2474f752a7d06f14cda064b43d9fa506b579f775b0df2b83659c7cbd3aa2ea1ccc4250a9b587036ece50a68882f6adfc66d3771b268d74ca165750dc66ffa966049425128853c087476c3bd3ad587409a80e2dce88aebee823892cff3ad78d259df47dd811e4ed8e360eca3e3b2cd451fad1d4dd868c97cb304beea635fcce860048e813c14a2a33d0dad096d25ad88f0a4317ed1c2d11c9f1c2fbfe7f93e366e08178022b79fa9a4ea8f4af912a35f33dba989c9894f5bf5b432f26cc818a9cc8a0daddb77d75d494c0b6670957cff0c8f096a31529c349fb68c21bcec29870984279fb24c1896d174f21eebc59d4be7c660c8373fc3692fa90693162f31f9f9da67bdb3bb096a0e63f4c37c2812f5d60dd85a1f98d334c138beb7fa9f4851ccb2e6305cd713e3c6123c722f09cb6a10b9be76b41a3187209aa2cefcd50f4fae7954a9c2e7b99ede53ff0490af798bc4b9583389d28c1c4f5bbe540d25b216b3ef92b0a223e3c10f2e10b62f7d4f33938153c8e63d96a2b9d18cf11768a128a046443f6627f26e515f30e55f1a7e3707bed953ba68a6f80f939cf4ce106bfdf37278ab9315bc1e70cfaf1683319f9b6732a328c68d3e945ff97ecdf6f08aba1c066a96a45e8ce3ec918267e0f9ad5608724df1105f1132574410f7406bf7b868cd8d38a78ab6a807b43611a0240844e8a05b2bc036d260bc0f2e93a25aed197ce1c139f1a7f74eaa75136e479e1da978ddeb7f7e50d3fb385b7e0866910bd4528a8b66765ecc6751dfd1dccb50fe4eda9d6f84bc665c88f85179e9791d46112d9ac64329510597381da2fc8f2f8d2278f16ea6eb63d78a4618d480646f504cd3142e82b190c4d8f755a7012d07761d6e5266edbe95db1a1bd7fae4605e1e1bf8b88cee2057748288c339152181486895d8b7f6a83d7393d3c76df6545ab0df80491002d8f6701a6fd251d7c95650057ed54f61367e043f56029ea2c3fc04f97aae0f2546146621f54b9d617fc335aa683a5343fe6edb40e8aa7ce5c6ace10d5a96f38a06b2024f40044e7e1dedf4e85d994c5efa78a655c536731d0bde5b764cff217de35fdf774b4b5a27a646ba21f5256b8ac24003ed03dc6880375f47ea33868ac6f655ae1d4743c2ef9ee29118635bf4bcb813926c1ede008dc9f5d707d2023d22d1d5fc2dfceb7065af17692ed78d62fe82edba35403eb0b82cc02987fce0af2261f5cee6ed3adb50a976642759ab6f4d1b85c48610b50ca1a1755942d05483c2c5d278a22c57492aed2cc82fd5b72e400951df951d2b9235eb31d1f6e1ea817add61dc51e7d3cbfda6cee67598d97d99d56513c0762d265ffc7c6c03f51086f2841a40136d67b9cd201230977bce77f662dcb71ff3823db4c921ecd6f0ac79ba6bf1dc2ca01890dc0045e4e8cc34e9aef2acab11e2dcf81c8f88ebe75ad645df74b6971724754cf74eab7ac2a9f027e70b22f33f70c91950173100d62760bc10e94f24f07f8544487ae5b64f5c81789a2608870562583a025a969bf9e5f0949c476ebc992054f0a1b2d139bfa82d2dfd58a435b83d2a7f12bf9d31e50f98c653a67a3c65aa54adf7564a6aa264e75f2d7235f006416c4341e2b44bb7b1e411e5ace8ed1665e292d8f19fc433e040d83f29215a70f3a641c247343df6c99bfa58920ee917b2bf27216578534ae850906ddeb5eb2269bb532f6cf61aba8ac75c2e2a993d0a151d2f53667399da565bfe448760345bea684b1a2c3f2e284f07bd974dd75f3fe22c985f36118981aea7", 0x1000}], 0x6, &(0x7f0000003240)=[@ip_tos_u8={{0xd}}], 0x10}}], 0x4, 0x6049054) clock_gettime(0x0, &(0x7f0000000d80)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000000c80)=[{{&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/97, 0x61}, {&(0x7f0000000140)=""/67, 0x43}, {&(0x7f0000000280)=""/165, 0xa5}, {&(0x7f00000001c0)=""/57, 0x39}], 0x4, &(0x7f0000000340)=""/53, 0x35}, 0x8a12}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000380)=""/45, 0x2d}, {&(0x7f00000003c0)=""/183, 0xb7}, {&(0x7f0000000480)=""/47, 0x2f}, {&(0x7f00000004c0)=""/84, 0x54}, {&(0x7f0000000540)=""/234, 0xea}], 0x5, &(0x7f00000006c0)=""/110, 0x6e}, 0x80200}, {{&(0x7f0000000740)=@ipx, 0x80, &(0x7f00000009c0)=[{&(0x7f00000007c0)=""/58, 0x3a}, {&(0x7f0000000800)=""/179, 0xb3}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000008c0)=""/39, 0x27}, {&(0x7f0000000900)=""/148, 0x94}], 0x5, &(0x7f0000000a40)=""/133, 0x85}, 0x20}, {{&(0x7f0000000b00)=@tipc=@id, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b80)=""/54, 0x36}], 0x1, &(0x7f0000000c00)=""/104, 0x68}, 0xffff38c8}], 0x4, 0x10002, &(0x7f0000000dc0)={r2, r3+30000000}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x1cd3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x2c) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 18:35:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x6c, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:35:23 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2b9, 0x0) 18:35:23 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2d9, 0x0) 18:35:23 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x31d, 0x0) [ 1948.158092][ T3427] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1948.279784][ T3427] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:35:23 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x597, 0x39b010590637f9f5) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000040)=@dstopts={0x2b, 0xf, [], [@generic={0x7f, 0x1c, "13a66a8cb890050737755407c648e5f817fd79daded7d89a25aefcdf"}, @ra={0x5, 0x2, 0x7}, @calipso={0x7, 0x40, {0x5, 0xe, 0x6, 0xb066, [0xfffffffffffffff7, 0x2, 0x5, 0x3ff, 0x76, 0x8, 0x6]}}, @padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @pad1]}, 0x80) r1 = getpid() getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r1, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000140)='/dev/input/mouse#\x00', 0xffffffffffffffff}, 0x30) r3 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0xc05c6104, &(0x7f0000000000)) perf_event_open(&(0x7f00000000c0)={0x3, 0x1a, 0x8, 0x9, 0x32, 0x8, 0x0, 0xfff, 0x40440, 0xa, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x4, @perf_config_ext={0x1000040000000000, 0x3f}, 0x10001, 0x5, 0x2, 0x1, 0x4, 0x7, 0x200}, r2, 0xffffffffffffffff, r3, 0x2) write$P9_RSETATTR(r0, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x3a8, 0x0) 18:35:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x74, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1948.624442][ T3449] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1948.728608][ T3449] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:35:31 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'batadv0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="3900001a060000000001000000000100be0306000000000000ad"]}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x5, 0x0, 0x100000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:35:31 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2ba, 0x0) 18:35:31 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 18:35:31 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x31e, 0x0) 18:35:31 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2da, 0x0) 18:35:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x7a, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1957.005211][ T3475] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:35:32 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x402100, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 1957.133979][ T3475] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:35:32 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2bb, 0x0) 18:35:32 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x31f, 0x0) 18:35:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x300, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1957.446290][ T3502] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:35:32 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2db, 0x0) [ 1957.528421][ T3502] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:35:32 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x320, 0x0) 18:35:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004140)={0xa, 0x6, 0x7, 0x40000000000003}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f00000000c0)}, 0x20) 18:35:39 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') r1 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r2) stat(0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getgid() getgroups(0x4, &(0x7f0000000380)=[r3, r4, 0x0, 0x0]) r5 = getuid() fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuseblk\x00', 0x0, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize'}}, {@max_read={'max_read', 0x3d, 0x401}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}], [{@subj_user={'subj_user', 0x3d, '\x0f^@\xc2\x88\xab\x97Hy,aY\xe2X\xcc\n\x9c\x1a\x8fC&\xf8M\xb5\f\xbb\xf1\x86\xb6\xd4\xf2Y\xd15\xb2T\xd0Rg\xee\\_\xf5\xa9\xdd\x1f|\xa5\x8d\x80r\x955f\x04,36\x12\xc7\x94\xbb#\x85M;\x0f\x832W\x99\n\xd5\xedM\x15t\x0e\x0f\xcb[v\xcde|J\x00\x96p*\xc7\x86L\fc\x8a\xc3?(\xe2%\xb93\x10\x91\xaa\xff\x17#D\xf9\x01\x94\xaf\x88\fr\xe6\xb6\xab\xc1\xba\xbd\x17\x90\x1aY\xd8\x13\xefb\xb0\x8cfP\"B\xca\x93\xda\xfa$\\S\x1e\x9cuEo\xc6M3\xaa\xae\xca\xa7u1\xf3\x87\x18\xac\xba\x9c\xb7\x96\x8a\x1b\xc8^\x89\xe1\xb9\xb2Ig\x92\xc1\a\xea}\"\x1d_|A\xe9\xfabb\xe1\x18\x9dZ\x11\xe6\x9c\xcb\xd4t\x05\x850\x80-\xe3TdB\x93\xac\xae8l/>(7\x88\xd3\xa9'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user'}}, {@audit='audit'}, {@context={'context', 0x3d, 'user_u'}}, {@fowner_gt={'fowner>', r5}}, {@fowner_gt={'fowner>', r6}}, {@euid_lt={'euid<', r7}}]}}) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 18:35:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x410, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:35:39 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2bc, 0x0) 18:35:39 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2dc, 0x0) 18:35:39 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x321, 0x0) [ 1964.264837][ T3532] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:35:39 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2bd, 0x0) [ 1964.378310][ T3532] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:35:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x500, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:35:39 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='\x00'/14) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 18:35:39 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2dd, 0x0) 18:35:39 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x322, 0x0) 18:35:39 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) [ 1964.718497][ T3556] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1964.814733][ T3556] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:35:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x600, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:35:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) sendmmsg$inet(r0, &(0x7f0000004200)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="88", 0x1}], 0x1, &(0x7f0000000140)=[@ip_ttl={{0x10, 0x0, 0x2, 0x2}}], 0x10}}], 0x1, 0x0) 18:35:46 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2be, 0x0) 18:35:46 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x323, 0x0) 18:35:46 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='[ta[k\x00') bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001f0000000c2500000400a100020000000000000b0000000000610000"], &(0x7f0000000280)=""/4096, 0x28, 0x1000, 0x1}, 0x20) r1 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0xc05c6104, &(0x7f0000000000)) r2 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0xc05c6104, &(0x7f0000000000)) connect$pptp(r2, &(0x7f00000001c0)={0x18, 0x2, {0x1, @remote}}, 0x1e) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000180)={&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140), 0x0, 0x0, 0x3}) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 18:35:46 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2de, 0x0) [ 1971.577258][ T3596] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:35:46 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc05c6104, &(0x7f0000000000)) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380)={0x0}, &(0x7f00000003c0)=0xc) rt_sigqueueinfo(r1, 0x17, &(0x7f0000000400)={0x5, 0x5, 0x6}) r2 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0xc05c6104, &(0x7f0000000000)) r3 = syz_open_dev$cec(0x0, 0x2, 0x2) creat(&(0x7f0000000280)='./file0\x00', 0x81) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000002c0)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff2000/0x8000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f00000001c0)="584263a286da4cc98e61f350def222e440339651d2f5d94066e85064fb0fff8245aec7c03fea60c912f956708ec50b36ba93de77ddfdb9b38e7c25dca917de9ae751e71cbdc750fe12791e917cbfe15d112400a377b5dd06e993cac8a7fe233f1153fb", 0x63, r3}, 0x68) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0xc05c6104, &(0x7f0000000000)) linkat(r2, &(0x7f0000000040)='./file0\x00', r3, &(0x7f0000000080)='./file0\x00', 0x400) setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000000c0)=0x20) preadv(r4, &(0x7f00000017c0), 0x3a8, 0x0) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x80000) [ 1971.717190][ T3596] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:35:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x700, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:35:46 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2bf, 0x0) 18:35:46 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 18:35:47 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2df, 0x0) [ 1972.088596][ T3611] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1972.239201][ T3611] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:35:47 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc05c6104, &(0x7f0000000000)) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000040)={0x5, 0x8, 0x4, 0x20, {}, {0x1, 0x0, 0x6, 0x80, 0x5, 0x54, "d6bbd636"}, 0xdab, 0x3, @planes=&(0x7f00000000c0)={0x9, 0xfffffff9, @fd, 0x7}, 0x4}) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0x5) r2 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0xc05c6104, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/fib_trie\x00') sendfile(r5, r6, 0x0, 0x7ffff000) socket$kcm(0x10, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f000007f000/0x1000)=nil) ioctl$TIOCNXCL(r2, 0x540d) 18:35:47 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c0, 0x0) 18:35:55 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x325, 0x0) 18:35:55 executing program 2: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x2, 0x4, 0xd14, 0x3, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xf, 0x5, &(0x7f0000000800)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x80000001}]}, &(0x7f0000000200)='syzkaller\x00', 0x5, 0xe2, &(0x7f00000005c0)=""/226, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 18:35:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x900, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:35:55 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2e0, 0x0) 18:35:55 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast1}, 0x3a) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x2, 0x20000) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x7) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r0, &(0x7f0000003280)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000700)="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", 0x901}, {&(0x7f0000001700)="1c", 0x1}], 0x2}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000002440)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000002840)=[{&(0x7f0000002480)="e60b2ca635608c31af2dc627f8030b43760532dd8a2a25521f91e36c40cada25a3f2ce58eebeaf123f8a907941d89ca98cbdee746666b7d1a2e909dd1582e0139167ca6b73cd22b4b73a26a0c53a35f0a6bdb305d521b6f28f4135cf0ca291cb01490e3601001c48c53315b31a13b1732d53bfdcb839b8b77eca8fc9", 0x7c}, {&(0x7f0000002500)="3c5608410d473e765b7e68b896f222aa55499dff49895329309fe473a0250e9dca9268721ecb5283009b5ac50818c7", 0x2f}, {&(0x7f0000002540)="98b164dee629c2fb7412159fc6a32278341ad047fa3562186880ec869aac5b492058eaacc7aa97244ac9a3b38e238bf57275114577a97938b31327a624779062abc128fb89c510d8cd470a188517ce1f94af3d7c3422fd018aed9b2b565a057be32870fbe434ff5b1534c486343287644c2aec5eb23e331724b8559adb5488ce5e3a7fed66f3467cb6f2ae4306497bedc1c54d9bfcbfc2c3c3e7b20da98a5b42ec6afeeeb79a7fd34ececf8dee9fea56aaa7950473abde42fd5ffeb8eafb40c6", 0xc0}, {&(0x7f0000002600)="bbb32924aa64d94d458f1cddd5cad6f9d604eb65fc1af16ed21b11422abc9eea5d071acbda18a68a6fd9f711eae3265544880d8b3c28eb61eef0b19448ed36894478eabd4404f5ba299476ec3989e641739ab6f7a7", 0x55}, {&(0x7f0000002680)="90246b5cc5b5de16ca59d952bd0ff80514b6b4b0dd4aa87838c080f0ef132851fb7a09d4bb97791e819f47fc298505aa1979654470c98ec4d533ec243bfba56b4b", 0x41}, {&(0x7f0000002700)="714cf4d32ce7d1a3930c48cb60b5bd8b24eb3468d021fdc1a3da9fc100245f80a99273e0a47f6e5956c6e56c0aa3fd619a8c4d19ae6bafd3193570857ee9ae405824ded162d8e1f3383a3628e4b92671666e92a05f7be84aac9a76c7d29932", 0x5f}, {&(0x7f0000002780)="8732c029c6ca6f256a9fc8930f9e329530fc136ac668af3add1b26e139a89bc33f3d608dd58d4e06f706f1b32ea2a9f42711b880bcd10501b96bc5a4c99dce9ee9fb76fb7a9ccc71f8f70480bcb3de5624388961c1aff15ab80fcddb08a33ff8659e7a2b5235c236c7ea2fbf61c26407c3255540b458ba76a5ea27be0cfd4edd9332cc62f020d462", 0x88}], 0x7, &(0x7f0000002880)=[@ip_pktinfo={{0x18, 0x0, 0x8, {0x0, @empty, @dev}}}, @ip_tos_u8={{0xd}}], 0x28}}, {{&(0x7f00000028c0)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000003200)=[{&(0x7f0000002900)="e90b14f8cf650d1106ac7cd6e0307ab8210c6c7e524f23af54f21fa4b9584ef9a60d6aee8c908134600d5cb548a2747c88a1603f880a96b7ced507625a0584d5e27e25d6627e3ebea1", 0x49}, {&(0x7f0000002f80)="8e84937a445fe15efdfc052096611a75e6e4fe5dddef287b057a1d1bddfd6d141d6307b0421fa1e82121705c266a6011da392050985135b804af7b0e718e13f316c953ff9020d4d14759648f1f487634ed6f22d9bc9a2b70b0e1ffc1828aecabdfebb3856b14caa7fe9fe9b9dd6e16f23ba265914f4fb3a49a0640028c7e03f1202d6f0b8f71600114c31fcff6e17432d8badaed2d48c0c4a23e112d8c8973b6fabc5bc3e4e84ba8b7b2e82da8afc362a00761f69de7e48fa1699d4c98b272a3e795a7b406f803190d851abdee5154f50ea0b16ba73435be7acd59f86beb6c", 0xdf}, {&(0x7f0000002980)="9f4a222c12140705f6c5a4299b208a7c8f98b78446cc8b388ef5291acadb8e41d62869efc7f137183ccae38d88f7afaf82551e1ffea25f215b85ca29d5fb1a665357b3a4d59485a8777fb5694a87c38812dac9788f27670a", 0x58}, {&(0x7f0000003080)="4b483173b21b1388d3885e9cbed6ed74df21b45291b19dac2a979ba3e18c797fa8cfa8f41635ec48e205ca3944f19ef418bae8bf4ab11c35a5f2e5cee0d89254a1ad5353c977f3df5547b9954e35e3ab80a615aaa1e94111902accc6b98dbd9e94ca70a9d33476ba9f40b8c923fbc50ce3aeab405b7e0ab43fa05b7692ba8b6da11561dccb5a97b8d3afcebe61ca5fb19f7598f9274a006f7c9eee41cc91180ccbe486c27191d13f0ae8831e1311f53498a1b0ae2b", 0xb5}, {&(0x7f0000003140)="11b92f8648741ca2c55608cb8a72783105958aff7b0b8b89b63706a9f18bc0347de89657442943765f6369272a67a4628a9d51f282d1b078e9cd8f536860fa641e92612506ddd78c111f932a37059b7b2ab71832fdc29e86bcada337f888fe92aeaaebdcdb7c774103bfaf38e60cf5fc8d899497a90222db991db68df27413dc715d0a45565fce9b622cd84bc6fbf43bd68e13073e3cfefcb5b3888d73191044", 0xa0}, {&(0x7f0000003ac0)="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", 0x1000}], 0x6, &(0x7f0000003240)=[@ip_tos_u8={{0xd}}], 0x10}}], 0x4, 0x6049054) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) process_vm_readv(r2, 0x0, 0x0, &(0x7f0000002780), 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r3, &(0x7f00000017c0), 0x3a8, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)={0x0, 0x2, 0x3}) fsetxattr(r4, &(0x7f0000000180)=@random={'btrfs.', '/dev/dsp#\x00'}, &(0x7f0000000040)='eth1mime_type&posix_acl_accesswlan1\x00', 0x24, 0x1) 18:35:55 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c1, 0x0) [ 1980.807369][ T3656] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:35:55 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)=""/93}, {&(0x7f0000000280)=""/4096}, {&(0x7f00000000c0)=""/55}, {&(0x7f0000000100)=""/50}, {&(0x7f0000000140)=""/113}], 0x1065, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 18:35:55 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c2, 0x0) [ 1980.899856][ T3656] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:35:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0xa00, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1981.211492][ T3676] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:35:56 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/21, 0x15}], 0x1, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/deV/bt\x19\xcc\x87\xe7\x05\x00ol\x00', 0x10000, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000040)={0x4, 0xfffffb5d, 0x1, 0x3, 0x2, 0xfffffff9}) r1 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0xc05c6104, &(0x7f0000000000)) r2 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0xc05c6104, &(0x7f0000000000)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) perf_event_open(0x0, r3, 0x3, r2, 0x4) gettid() r4 = syz_open_procfs(r3, &(0x7f0000000280)='net/sco\x00') r5 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r5, 0xc05c6104, &(0x7f0000000000)) ioctl$RNDADDTOENTCNT(r5, 0x40045201, &(0x7f0000000080)=0x3) getgid() preadv(r4, &(0x7f0000000200)=[{&(0x7f0000000100)=""/234, 0xea}], 0x1, 0x0) 18:35:56 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c3, 0x0) 18:35:56 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x326, 0x0) [ 1981.323883][ T3676] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:35:56 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc05c6104, &(0x7f0000000000)) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000000)={0x18, "ebc79bf421200ea5e8d4ced3721737cb9275c74bfcdbf8d2"}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x3a8, 0x0) 18:36:04 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="00040000b1"], 0x9) 18:36:04 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2e1, 0x0) 18:36:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1004, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:36:04 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c4, 0x0) 18:36:04 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="da", 0x1, 0xffffffffffffffff) keyctl$setperm(0x5, r0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000000)={r0, 0x6a, 0x31}, &(0x7f0000000040)={'enc=', 'oaep', ' hash=', {'sha224\x00'}}, &(0x7f00000000c0)="ed18b63d8b5b468f3082ff2ac26aa81c5d61bd21b34609f4b0c582d99c3e8fd595c1031bd9b335fa43cf86744593f3323f564047433ec7cb503df3a51ebf57ab81e62a8f988f5a5cd023a0d82e74c098cf435b5f781ed40d5cad0edcd0e54d6ccbd839d403fb3aa9c54d", &(0x7f0000000140)=""/49) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) 18:36:04 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x327, 0x0) [ 1989.231038][ T3731] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1989.358809][ T3731] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:36:04 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x328, 0x0) 18:36:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1020, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:36:04 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c5, 0x0) 18:36:04 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2e2, 0x0) 18:36:04 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(0x0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x16) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x200100, 0x0) r3 = socket$inet(0x2, 0x80001, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000240)={r5}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)={r5, 0x37, "d52a81c0e159501439ae48b3fcae99197a998ed57087e7f2cbd4c9ed185ac016dba87ba3d7f53d7e69bc4db1e600f9c6d00697d8c8e851"}, &(0x7f0000000080)=0x3f) ioctl$KDDELIO(r2, 0x4b35, 0x0) r6 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0xc05c6104, &(0x7f0000000000)) ioctl$TUNSETSNDBUF(r6, 0x400454d4, &(0x7f00000000c0)=0x6) 18:36:04 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x329, 0x0) [ 1989.801818][ T3756] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities [ 1989.982169][ T3756] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:36:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x2000, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) 18:36:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0xb5, &(0x7f00000000c0)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="500000001000050700"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5, @ANYBLOB="280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000000000b00200"], 0x50}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@dellink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}, 0x1, 0xe}, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0300a1695e1dcfe87b1071") 18:36:11 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c6, 0x0) 18:36:11 executing program 0: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x32a, 0x0) 18:36:11 executing program 1: process_vm_readv(0x0, 0x0, 0xffffffffffffff9a, &(0x7f0000002780)=[{&(0x7f00000000c0)=""/48, 0x30}], 0x1, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x100, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) r2 = gettid() syz_open_procfs(r2, &(0x7f0000000240)='fdinfo/4\x00') r3 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0xc05c6104, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000140)=0x4) syz_open_procfs(r2, &(0x7f0000000080)='net/icmp6\x00') r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = syz_open_dev$cec(0x0, 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r5, 0xc05c6104, &(0x7f0000000000)) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x28200, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x14, r8, 0xf09}, 0x14}}, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r6, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000400)={&(0x7f00000004c0)={0x74, r8, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x95d}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x68}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0xb}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfc}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}]}]}, 0x74}}, 0x40) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000280)={'mangle\x00', 0xde, "6b042243916199ff0b99680d1fe2f5818625467c35a5309518556522a5d66f2d95237b6d55af76be0646d97b310c23b7ca9d1760ee953e7c4423d73cdf2111bc3e0d22aef7ee21395a528bcb5629473f938c1f8f096cd010589659344879ddeb40b73052f7b273d7540a2df72d059e35b078bca295b7a1f1515b040a0decc1d704e5f40c73b27fa1f4a26817937582530ef7bd56c309149a23a15b2393c601cb833275a57b0dd9cba477c9b7f499e2299a0242056c8f8c7824306c9b5b7679351d0bfc48a75c4b1d27532033c3e0bc8776053d51ef52dba29e066a30a1b8"}, &(0x7f00000001c0)=0x102) r9 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r9, &(0x7f0000000100)={0x2, 0x4e20, @multicast1}, 0x3a) setsockopt$sock_int(r9, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r9, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r9, &(0x7f0000003280)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000700)="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", 0x901}, {&(0x7f0000001700)="1c", 0x1}], 0x2}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000002440)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000002840)=[{&(0x7f0000002480)="e60b2ca635608c31af2dc627f8030b43760532dd8a2a25521f91e36c40cada25a3f2ce58eebeaf123f8a907941d89ca98cbdee746666b7d1a2e909dd1582e0139167ca6b73cd22b4b73a26a0c53a35f0a6bdb305d521b6f28f4135cf0ca291cb01490e3601001c48c53315b31a13b1732d53bfdcb839b8b77eca8fc9", 0x7c}, {&(0x7f0000002500)="3c5608410d473e765b7e68b896f222aa55499dff49895329309fe473a0250e9dca9268721ecb5283009b5ac50818c7", 0x2f}, {&(0x7f0000002540)="98b164dee629c2fb7412159fc6a32278341ad047fa3562186880ec869aac5b492058eaacc7aa97244ac9a3b38e238bf57275114577a97938b31327a624779062abc128fb89c510d8cd470a188517ce1f94af3d7c3422fd018aed9b2b565a057be32870fbe434ff5b1534c486343287644c2aec5eb23e331724b8559adb5488ce5e3a7fed66f3467cb6f2ae4306497bedc1c54d9bfcbfc2c3c3e7b20da98a5b42ec6afeeeb79a7fd34ececf8dee9fea56aaa7950473abde42fd5ffeb8eafb40c6", 0xc0}, {&(0x7f0000002600)="bbb32924aa64d94d458f1cddd5cad6f9d604eb65fc1af16ed21b11422abc9eea5d071acbda18a68a6fd9f711eae3265544880d8b3c28eb61eef0b19448ed36894478eabd4404f5ba299476ec3989e641739ab6f7a7", 0x55}, {&(0x7f0000002680)="90246b5cc5b5de16ca59d952bd0ff80514b6b4b0dd4aa87838c080f0ef132851fb7a09d4bb97791e819f47fc298505aa1979654470c98ec4d533ec243bfba56b4b", 0x41}, {&(0x7f0000002700)="714cf4d32ce7d1a3930c48cb60b5bd8b24eb3468d021fdc1a3da9fc100245f80a99273e0a47f6e5956c6e56c0aa3fd619a8c4d19ae6bafd3193570857ee9ae405824ded162d8e1f3383a3628e4b92671666e92a05f7be84aac9a76c7d29932", 0x5f}, {&(0x7f0000002780)="8732c029c6ca6f256a9fc8930f9e329530fc136ac668af3add1b26e139a89bc33f3d608dd58d4e06f706f1b32ea2a9f42711b880bcd10501b96bc5a4c99dce9ee9fb76fb7a9ccc71f8f70480bcb3de5624388961c1aff15ab80fcddb08a33ff8659e7a2b5235c236c7ea2fbf61c26407c3255540b458ba76a5ea27be0cfd4edd9332cc62f020d462", 0x88}], 0x7, &(0x7f0000002880)=[@ip_pktinfo={{0x18, 0x0, 0x8, {0x0, @empty, @dev}}}, @ip_tos_u8={{0xd}}], 0x28}}, {{&(0x7f00000028c0)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000003200)=[{&(0x7f0000002900)="e90b14f8cf650d1106ac7cd6e0307ab8210c6c7e524f23af54f21fa4b9584ef9a60d6aee8c908134600d5cb548a2747c88a1603f880a96b7ced507625a0584d5e27e25d6627e3ebea1", 0x49}, {&(0x7f0000002f80)="8e84937a445fe15efdfc052096611a75e6e4fe5dddef287b057a1d1bddfd6d141d6307b0421fa1e82121705c266a6011da392050985135b804af7b0e718e13f316c953ff9020d4d14759648f1f487634ed6f22d9bc9a2b70b0e1ffc1828aecabdfebb3856b14caa7fe9fe9b9dd6e16f23ba265914f4fb3a49a0640028c7e03f1202d6f0b8f71600114c31fcff6e17432d8badaed2d48c0c4a23e112d8c8973b6fabc5bc3e4e84ba8b7b2e82da8afc362a00761f69de7e48fa1699d4c98b272a3e795a7b406f803190d851abdee5154f50ea0b16ba73435be7acd59f86beb6c", 0xdf}, {&(0x7f0000002980)="9f4a222c12140705f6c5a4299b208a7c8f98b78446cc8b388ef5291acadb8e41d62869efc7f137183ccae38d88f7afaf82551e1ffea25f215b85ca29d5fb1a665357b3a4d59485a8777fb5694a87c38812dac9788f27670a", 0x58}, {&(0x7f0000003080)="4b483173b21b1388d3885e9cbed6ed74df21b45291b19dac2a979ba3e18c797fa8cfa8f41635ec48e205ca3944f19ef418bae8bf4ab11c35a5f2e5cee0d89254a1ad5353c977f3df5547b9954e35e3ab80a615aaa1e94111902accc6b98dbd9e94ca70a9d33476ba9f40b8c923fbc50ce3aeab405b7e0ab43fa05b7692ba8b6da11561dccb5a97b8d3afcebe61ca5fb19f7598f9274a006f7c9eee41cc91180ccbe486c27191d13f0ae8831e1311f53498a1b0ae2b", 0xb5}, {&(0x7f0000003140)="11b92f8648741ca2c55608cb8a72783105958aff7b0b8b89b63706a9f18bc0347de89657442943765f6369272a67a4628a9d51f282d1b078e9cd8f536860fa641e92612506ddd78c111f932a37059b7b2ab71832fdc29e86bcada337f888fe92aeaaebdcdb7c774103bfaf38e60cf5fc8d899497a90222db991db68df27413dc715d0a45565fce9b622cd84bc6fbf43bd68e13073e3cfefcb5b3888d73191044", 0xa0}, {&(0x7f0000003ac0)="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", 0x1000}], 0x6, &(0x7f0000003240)=[@ip_tos_u8={{0xd}}], 0x10}}], 0x4, 0x6049054) setsockopt$inet_MCAST_MSFILTER(r9, 0x0, 0x30, &(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x290) bind$inet(r4, &(0x7f0000000100)={0x2, 0x4e20, @multicast1}, 0x3a) ptrace$setopts(0x4206, r2, 0x0, 0x40) setsockopt$sock_int(r4, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r4, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r4, &(0x7f0000003280)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000700)="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", 0x901}, {&(0x7f0000001700)="1c", 0x1}], 0x2}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000002440)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000002840)=[{&(0x7f0000002480)="e60b2ca635608c31af2dc627f8030b43760532dd8a2a25521f91e36c40cada25a3f2ce58eebeaf123f8a907941d89ca98cbdee746666b7d1a2e909dd1582e0139167ca6b73cd22b4b73a26a0c53a35f0a6bdb305d521b6f28f4135cf0ca291cb01490e3601001c48c53315b31a13b1732d53bfdcb839b8b77eca8fc9", 0x7c}, {&(0x7f0000002500)="3c5608410d473e765b7e68b896f222aa55499dff49895329309fe473a0250e9dca9268721ecb5283009b5ac50818c7", 0x2f}, {&(0x7f0000002540)="98b164dee629c2fb7412159fc6a32278341ad047fa3562186880ec869aac5b492058eaacc7aa97244ac9a3b38e238bf57275114577a97938b31327a624779062abc128fb89c510d8cd470a188517ce1f94af3d7c3422fd018aed9b2b565a057be32870fbe434ff5b1534c486343287644c2aec5eb23e331724b8559adb5488ce5e3a7fed66f3467cb6f2ae4306497bedc1c54d9bfcbfc2c3c3e7b20da98a5b42ec6afeeeb79a7fd34ececf8dee9fea56aaa7950473abde42fd5ffeb8eafb40c6", 0xc0}, {&(0x7f0000002600)="bbb32924aa64d94d458f1cddd5cad6f9d604eb65fc1af16ed21b11422abc9eea5d071acbda18a68a6fd9f711eae3265544880d8b3c28eb61eef0b19448ed36894478eabd4404f5ba299476ec3989e641739ab6f7a7", 0x55}, {&(0x7f0000002680)="90246b5cc5b5de16ca59d952bd0ff80514b6b4b0dd4aa87838c080f0ef132851fb7a09d4bb97791e819f47fc298505aa1979654470c98ec4d533ec243bfba56b4b", 0x41}, {&(0x7f0000002700)="714cf4d32ce7d1a3930c48cb60b5bd8b24eb3468d021fdc1a3da9fc100245f80a99273e0a47f6e5956c6e56c0aa3fd619a8c4d19ae6bafd3193570857ee9ae405824ded162d8e1f3383a3628e4b92671666e92a05f7be84aac9a76c7d29932", 0x5f}, {&(0x7f0000002780)="8732c029c6ca6f256a9fc8930f9e329530fc136ac668af3add1b26e139a89bc33f3d608dd58d4e06f706f1b32ea2a9f42711b880bcd10501b96bc5a4c99dce9ee9fb76fb7a9ccc71f8f70480bcb3de5624388961c1aff15ab80fcddb08a33ff8659e7a2b5235c236c7ea2fbf61c26407c3255540b458ba76a5ea27be0cfd4edd9332cc62f020d462", 0x88}], 0x7, &(0x7f0000002880)=[@ip_pktinfo={{0x18, 0x0, 0x8, {0x0, @empty, @dev}}}, @ip_tos_u8={{0xd}}], 0x28}}, {{&(0x7f00000028c0)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000003200)=[{&(0x7f0000002900)="e90b14f8cf650d1106ac7cd6e0307ab8210c6c7e524f23af54f21fa4b9584ef9a60d6aee8c908134600d5cb548a2747c88a1603f880a96b7ced507625a0584d5e27e25d6627e3ebea1", 0x49}, {&(0x7f0000002f80)="8e84937a445fe15efdfc052096611a75e6e4fe5dddef287b057a1d1bddfd6d141d6307b0421fa1e82121705c266a6011da392050985135b804af7b0e718e13f316c953ff9020d4d14759648f1f487634ed6f22d9bc9a2b70b0e1ffc1828aecabdfebb3856b14caa7fe9fe9b9dd6e16f23ba265914f4fb3a49a0640028c7e03f1202d6f0b8f71600114c31fcff6e17432d8badaed2d48c0c4a23e112d8c8973b6fabc5bc3e4e84ba8b7b2e82da8afc362a00761f69de7e48fa1699d4c98b272a3e795a7b406f803190d851abdee5154f50ea0b16ba73435be7acd59f86beb6c", 0xdf}, {&(0x7f0000002980)="9f4a222c12140705f6c5a4299b208a7c8f98b78446cc8b388ef5291acadb8e41d62869efc7f137183ccae38d88f7afaf82551e1ffea25f215b85ca29d5fb1a665357b3a4d59485a8777fb5694a87c38812dac9788f27670a", 0x58}, {&(0x7f0000003080)="4b483173b21b1388d3885e9cbed6ed74df21b45291b19dac2a979ba3e18c797fa8cfa8f41635ec48e205ca3944f19ef418bae8bf4ab11c35a5f2e5cee0d89254a1ad5353c977f3df5547b9954e35e3ab80a615aaa1e94111902accc6b98dbd9e94ca70a9d33476ba9f40b8c923fbc50ce3aeab405b7e0ab43fa05b7692ba8b6da11561dccb5a97b8d3afcebe61ca5fb19f7598f9274a006f7c9eee41cc91180ccbe486c27191d13f0ae8831e1311f53498a1b0ae2b", 0xb5}, {&(0x7f0000003140)="11b92f8648741ca2c55608cb8a72783105958aff7b0b8b89b63706a9f18bc0347de89657442943765f6369272a67a4628a9d51f282d1b078e9cd8f536860fa641e92612506ddd78c111f932a37059b7b2ab71832fdc29e86bcada337f888fe92aeaaebdcdb7c774103bfaf38e60cf5fc8d899497a90222db991db68df27413dc715d0a45565fce9b622cd84bc6fbf43bd68e13073e3cfefcb5b3888d73191044", 0xa0}, {&(0x7f0000003ac0)="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", 0x1000}], 0x6, &(0x7f0000003240)=[@ip_tos_u8={{0xd}}], 0x10}}], 0x4, 0x6049054) r10 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/attr/fscreate\x00', 0x2, 0x0) preadv(r10, &(0x7f00000017c0), 0x161, 0x0) 18:36:11 executing program 3: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2e3, 0x0) [ 1996.447987][ T3786] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:36:11 executing program 5: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x2c7, 0x0) [ 1996.537261][ T3786] EXT4-fs (loop4): couldn't mount as ext3 due to feature incompatibilities 18:36:11 executing program 1: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000000)) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 18:36:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x2010, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253efc1c8b63edad3c020f5027972060e8ac2a8b6001fd635da8bbdf3c158d110d784a764df43a90ed9", 0x61, 0x400}], 0x0, 0x0) [ 1996.763397][ T3789] ==================================================================