[], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x2}}}}}}}}}, 0x0) 03:33:54 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = geteuid() mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}, {@upperdir={'upperdir', 0x3d, './file1'}}, {@nfs_export_on='nfs_export=on'}, {@xino_off='xino=off'}], [{@fsmagic={'fsmagic', 0x3d, 0x5}}, {@uid_gt={'uid>', r1}}, {@fsname={'fsname'}}]}) exit(0x0) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000000) getdents64(r0, 0x0, 0x0) 03:33:54 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x101000, 0x0) ioctl$CAPI_SET_FLAGS(r0, 0x80044324, &(0x7f0000000040)) 03:33:54 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x8}}}}}}}}}, 0x0) 03:33:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0xedc000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:33:54 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000, 0x0) 03:33:54 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfbffffff, 0x0) 03:33:54 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0xaae51cba68316b0f, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x200, 0x0) ioctl$TIOCSTI(r1, 0x5412, 0x6) 03:33:54 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0xd}}}}}}}}}, 0x0) [ 906.338385][T11682] overlayfs: unrecognized mount option "fsmagic=0x0000000000000005" or missing value 03:33:55 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x28}}}}}}}}}, 0x0) 03:33:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x2, 0x20000) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{}, {}]}) 03:33:55 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xedc000000000, 0x0) 03:33:55 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfcfdffff, 0x0) [ 907.135233][T11689] overlayfs: unrecognized mount option "fsmagic=0x0000000000000005" or missing value 03:33:55 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) exit(0xfffffffffffffffe) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x10000, 0x2) setns(r1, 0x28000000) getdents64(r0, 0x0, 0x0) 03:33:55 executing program 5: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000080)={0x0, 0xbf, "0c9c2ee0a10510da70da5706ea2efb9f2e8d38e86a6db025bdb216bdc124b758009ae3e426b0d1039e702e004452fc49df99bc6e468b9c887e9804d87dd0348d9763a839bbd78b4c6616285b3fdfcce0bde2f135628efc2e5fb08ba916552d97f63a756ed52e4a2f0db335f7b0a326ee6e736d4b1aeefb976182040e9248b22c5a09440236e6502b2d183db26ed9ed1df5097377d48ee81824476befea46f5b7595d8e27e3155eda3b8828b12bef05d1ca810ae1507196373986e43ccd37ef"}, &(0x7f0000000180)=0xc7) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0x5, 0x8002, 0x7, 0x9, r1}, &(0x7f0000000200)=0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='bpf\x00', 0x34, &(0x7f0000000380)={[{@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x977c}}, {@mode={'mode', 0x3d, 0xff}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x7}}], [{@hash='hash'}, {@fsname={'fsname', 0x3d, '\x00'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@pcr={'pcr', 0x3d, 0x10}}, {@fowner_lt={'fowner<', r2}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}) openat(r0, &(0x7f00000004c0)='./file0\x00', 0x401, 0x10) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f0000000240)) 03:33:55 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x30}}}}}}}}}, 0x0) 03:33:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x1000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:33:55 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000000, 0x0) 03:33:55 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfdfdffff, 0x0) 03:33:55 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x48}}}}}}}}}, 0x0) 03:33:55 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x1000000) 03:33:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = accept(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) sendto$unix(r0, &(0x7f0000000080)="01d62739aab7f05cbd7e994c1c8a9cea9e6228d1a1e045dcfe3bc222bf2f35917442c09c54c98171b4b25af4b6fa85b53a911d381e1f6954a0e8c86c5dbca7b5fe830a0ec358b3910efe097a1c3f7111d7f3198c8e6a3fd4c3ccc10ce9fa13c19dfed0ca20a436ec83d2aebb04882642a5ff194c61816cba713a21d749626568957918d4cddd74bed9cf4e7c", 0x8c, 0x4040, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f00000003c0)=0xc) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@ipv4={[], [], @local}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f00000005c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000000700)=0xe8) r5 = add_key$keyring(&(0x7f0000000840)='keyring\x00', &(0x7f0000000880)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000008c0)={r5, 0x40, 0xfffffffffffffffa}, &(0x7f0000000c00)=ANY=[@ANYBLOB="656e633d6f61657020686173683d6372633332000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000026d5ab2c33c21e523be82a9454e6c0b6c6aa88e922295116ad661b80fe4c9e99f1c0f1481c7331728a499c72ca9a00764fe94e7bd283e616c07220e34e0b92c536b4171fb7bc6dbb9e1b23bf141ddb924e365bdb81e9bc3aca1e4fa501860da0ade84b9fc793a16515c3d213b7da1037564ff1153dc7a2dad8cf3373680e139f51b2fa40c5a9fae0c63389ac"], &(0x7f0000000980)="a603f0484f23e46052ca363ef44b47a7f3aee8cd02cafd9bf51e39f5a7c95fc63c89819cbd8602842af7822ed7b8c2d355f2c69dce469beecd822474b6ba4601ca1f86e63a26fbf005177df31e51e8255608", &(0x7f0000000a00)=""/226) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x1, &(0x7f0000000340)=[{&(0x7f0000000240)="7125ee32a8cfcef16cf45c81846ca64fbb658de8bd620efff62f491ec70c1d6967606b3e6ef222d0cb2aa0c49372f908e86893ab95b4d6cc8f233f66d6674633f923b895b6746a75582c8251fc4ed13c3e278681150d38f96118917bd3b16fe6fdd80bad55608bbdc3ec48656935a60ca8b36d295edee1d7b993564dc69939adfd9827a12f989a0ff239c196b868a66ff3ab344c7e19e049ff1e99f4b2e22b6c593958f26666c606aeaca10aade47f220d088826ccc1d9d25e09bf15551d069f35b71b4bd24f2a354187a8217e30b61dd4a73479a6b325612568cc00bcc2f7bc5c2e33a818fce78bfb3d810c7af50bc97973", 0xf2, 0x1}], 0x80040, &(0x7f0000000740)={[{@nodots='nodots'}, {@dots='dots'}, {@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@fat=@errors_remount='errors=remount-ro'}, {@dots='dots'}, {@dots='dots'}, {@dots='dots'}, {@dots='dots'}], [{@euid_lt={'euid<', r1}}, {@euid_lt={'euid<', r2}}, {@seclabel='seclabel'}, {@fowner_lt={'fowner<', r3}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@obj_role={'obj_role', 0x3d, 'eth1security\x90)nodevnodev'}}, {@fowner_gt={'fowner>', r4}}]}) 03:33:56 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x60}}}}}}}}}, 0x0) 03:33:56 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfeffffff, 0x0) 03:33:56 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0xf0}}}}}}}}}, 0x0) 03:33:56 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) exit(0x0) getdents64(r0, 0x0, 0x2fa) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xa8b6, 0x44100) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r2, 0x301, 0x70bd2c, 0x25dfdbff, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x2}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}]}, 0x60}, 0x1, 0x0, 0x0, 0x4008080}, 0x10) 03:33:56 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x7ffffffffffff, 0x0) 03:33:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x4000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:33:56 executing program 5: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$KDADDIO(r0, 0x4b34, 0x100000001) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffc) 03:33:56 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x543}}}}}}}}}, 0x0) 03:33:56 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f0000, 0x0) 03:33:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x402002, 0x0) execveat(r0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000340)=[&(0x7f00000000c0)='vboxnet1user\x00', &(0x7f0000000100)='\x00', &(0x7f0000000140)='selinux\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000200)='\'md5sum!@-\x00', &(0x7f0000000240)='%\x00', &(0x7f0000000280)='wlan0\x00', &(0x7f00000002c0)='+-vboxnet1\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000400)=[&(0x7f00000003c0)='cpuseteth1GPL\x00'], 0x100) 03:33:56 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x608}}}}}}}}}, 0x0) 03:33:57 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10000000000000, 0x0) 03:33:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) sendto(r0, &(0x7f0000000040)="f77c3750d61f489327ed5344651c232b708bc7bd8d5a7e4c7a15a23ec70ed31183d0eec57152e8686b22ac41604c1f647286f42931c9f52020553562f106", 0x3e, 0x40040, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x2, @local, 'ip_vti0\x00'}}, 0x80) 03:33:57 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x689}}}}}}}}}, 0x0) 03:33:57 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdf9, 0x0) 03:33:57 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) exit(0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0xffffffffffffffff, 0x66de8000000, 0x2, 0x9, 0x6, [{0x5, 0x7fff, 0x400, 0x0, 0x0, 0x8}, {0x401, 0x9, 0x1ff, 0x0, 0x0, 0x200}, {0xccf, 0x8, 0x6, 0x0, 0x0, 0x400}, {0x1ff, 0x4880000000000, 0x1, 0x0, 0x0, 0x80}, {0xbd, 0xfffffffffffff994, 0x3, 0x0, 0x0, 0x3a00}, {0x4, 0x59, 0x0, 0x0, 0x0, 0x100}]}) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f00000000c0)={0x3a, @multicast1, 0x4e20, 0x3, 'none\x00', 0xc, 0x4, 0x55}, 0x2c) getdents64(r0, 0x0, 0x0) 03:33:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:33:57 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x7fffffff, 0x2000) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f00000001c0)={0x18, 0x0, {0x4, @local, 'vcan0\x00'}}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x200000, 0x0) readlinkat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/170, 0xaa) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 03:33:57 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x806}}}}}}}}}, 0x0) 03:33:57 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100000000000000, 0x0) 03:33:57 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdfc, 0x0) 03:33:57 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0xd00}}}}}}}}}, 0x0) 03:33:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x4000, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000280)=0x7ff) statx(r1, &(0x7f0000000340)='./file0\x00', 0x100, 0x30, &(0x7f0000000180)) ioctl$CAPI_GET_FLAGS(r0, 0x80044323, &(0x7f00000002c0)) renameat2(r0, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00', 0x1) 03:33:57 executing program 5: readlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=""/18, 0x12) r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$IOC_PR_PREEMPT(r0, 0xc05c6104, &(0x7f0000000040)={0x700000000000000}) mkdir(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x2}, &(0x7f00000001c0)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x900, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000240)={r1, 0x30, &(0x7f0000000200)=[@in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x26}}, @in={0x2, 0x4e24, @local}]}, &(0x7f0000000280)=0x10) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=0x0) r3 = geteuid() ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000140)={0xfffffffffffffff8, 0x2, r2, 0x0, r3, 0x0, 0x2, 0x8}) 03:33:57 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0xe80}}}}}}}}}, 0x0) 03:33:58 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdfd, 0x0) 03:33:58 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x2000}}}}}}}}}, 0x0) 03:33:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x10000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:33:58 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x408000, 0xa0) mkdir(&(0x7f0000000100)='./file0\x00', 0x24) mkdir(&(0x7f0000000000)='./file0\x00', 0x4) 03:33:58 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x200000000000000, 0x0) 03:33:58 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x2800}}}}}}}}}, 0x0) 03:33:58 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xb339, 0x10800) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f00000000c0)=0x7) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x400c0, 0x2b) exit(0x0) getdents64(r1, 0x0, 0x0) 03:33:58 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f, 0x0) 03:33:58 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x3000}}}}}}}}}, 0x0) 03:33:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x5, &(0x7f0000000340)=[{&(0x7f00000000c0)="51ca24eca27bd5305fbc68e0edc115d5cc2fadab1a2321842c308ea19bb5130eee0cc6dbbb5e6f1934a6356b9a739cc2132ae087bb35a157d8736e684c81919d790b2abd716be7604a38dcb19ba40fe816707c6e055bc24cba2c867dbbebbf99699edf1c3fdb295c26c8c038283981a0c3efe691bd85afa72d907e62c0", 0x7d, 0x200}, {&(0x7f0000000140)="675ab196ab3639aa44fe132ce05871bb74bff60de454421342837fdb6aed8b19ed3c7ff26d849b5ce1edd44d8b8e936c2ff623bb900c9536774e75f2f831a41870be9c1ed05abb0f610a9a2825f8173f10f56cec6e6e1c1ce319e227158276379e9cd523ce445483c899eef269053d200839ce0c755e9f92ba", 0x79}, {&(0x7f00000001c0)="447e0ef7fddbed54f2ac4d80cfc28663a85bab1fbc8629aad8c92642681fe9c63f9f8ceb82ccb6c863f02083c80540444f84dfd676696da07635c2c7287d3e9068554a0ee50979ddf105c0410000000000", 0xfffffffffffffe63, 0x80000000000f538}, {&(0x7f0000000240)="13b29f0f97b2ce899e6a245a18c6fa07b7695564a83fe219337317e018d931f8e74debf533", 0x25, 0x9342}, {&(0x7f0000000280)="87df7d801eddc6fa69f59ca98781b5908d1e37ff23eb77b4ee3f2ac027b9c10a2d959efc3e2cb8c8d1ae14298602288e076dde9a51348c431240a18e857e99cd58880193d8d37b106cf3d08623b4abe522da73747cbb4fd455f089ae40abae45418315b8c88490901e76bfe623794407146ff314aee843b852725b236b5f4a77f2295df56e98ed2ca77c1c70aa6707e7d506d7f6172c4a81d20518c130886989259d5683badc764bc596abe2873997cf6a91bd628b9cafae68072d", 0xbb, 0xa0ae}], 0xfffffe, &(0x7f00000003c0)={[{@fault_injection={'fault_injection', 0x3d, 0xdcc}}, {@acl='acl'}], [{@obj_role={'obj_role', 0x3d, 'ppp1md5sumselinux'}}, {@smackfshat={'smackfshat', 0x3d, 'em1\\\x8ctrusted::[q'}}, {@permit_directio='permit_directio'}]}) 03:33:58 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x3580}}}}}}}}}, 0x0) 03:33:59 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff8c, 0x0) 03:33:59 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x300000000000000, 0x0) 03:33:59 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x3f00}}}}}}}}}, 0x0) 03:33:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x40000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:33:59 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x4305}}}}}}}}}, 0x0) 03:33:59 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x4788}}}}}}}}}, 0x0) 03:33:59 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff4, 0x0) 03:33:59 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) exit(0x0) getdents64(r0, 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_SET_VERSION(r1, 0xc0106407, &(0x7f00000000c0)={0xffffffff, 0x6, 0x5450, 0x321e}) 03:33:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0xb0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) recvmsg$kcm(r0, &(0x7f0000000600)={&(0x7f0000000180)=@can, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)=""/147, 0x93}, {&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/33, 0x21}, {&(0x7f00000003c0)=""/28, 0x1c}, {&(0x7f0000000400)=""/78, 0x4e}], 0x5, &(0x7f0000000500)=""/246, 0xf6}, 0x100) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.upper\x00', &(0x7f0000001740)=ANY=[@ANYRES64=r0], 0x1, 0x0) readlinkat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/7, 0x7) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = add_key$keyring(&(0x7f00000006c0)='keyring\x00', &(0x7f0000000700)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000740)={r2, 0x9}, &(0x7f0000000880)=ANY=[], &(0x7f00000027c0)="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", &(0x7f0000000780)=""/79) 03:33:59 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x400000000000000, 0x0) 03:33:59 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x4800}}}}}}}}}, 0x0) 03:33:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0xf83f0000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:33:59 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff5, 0x0) 03:33:59 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x4888}}}}}}}}}, 0x0) 03:33:59 executing program 5: lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:devicekit_var_lib_t:s0\x00', 0x29, 0x80000000000003) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 03:33:59 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x6000}}}}}}}}}, 0x0) 03:33:59 executing program 5: rename(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:00 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x500000000000000, 0x0) 03:34:00 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x6488}}}}}}}}}, 0x0) 03:34:00 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4480, 0x0) exit(0x0) getdents64(r0, 0x0, 0x0) 03:34:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:00 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff6, 0x0) 03:34:00 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x800e}}}}}}}}}, 0x0) 03:34:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x100000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:00 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x600000000000000, 0x0) 03:34:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x4000, 0x80) 03:34:00 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x8035}}}}}}}}}, 0x0) 03:34:00 executing program 5: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x84000, 0x13a) write$binfmt_misc(r0, &(0x7f0000000040)={'syz1', "dfa33c80714ad35963425cfaa2eb128e02bab36272fb19b9cb0ee1a1c0d8be4574242e315822059bf82bf7faaa7e765b060840c77eb58beb1225484e3e1d7bda78c2a2096e95626f09c74c72c3cf090d3776511c4fc5ba1f1cd1b0d7c24ed172761242685a900939415ed8f7b84b1050e36b5878a1225b297bd87d909dd0d8d5486a1ce9026a101aff965785c0a43c2fd363"}, 0x96) mkdir(&(0x7f0000000180)='./file0\x00', 0x2) 03:34:00 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x8100}}}}}}}}}, 0x0) 03:34:01 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffffb, 0x0) 03:34:01 executing program 5: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x2401, 0x1) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$revoke(0x3, r0) truncate(&(0x7f0000000080)='./file0\x00', 0x7fff) mkdir(&(0x7f0000000040)='./file0\x00', 0x5) chmod(&(0x7f00000000c0)='./file0\x00', 0xcc) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffc) 03:34:01 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x589002, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x9, 0x10}, &(0x7f0000000280)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f00000002c0)={r2, 0x3ff}, 0x8) exit(0xfffffffffffffffd) getdents64(r0, 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0x1, 0x200) r3 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0xffffffffffff8de9, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000180)={{0xa, 0x4e23, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}, {0xa, 0x4e23, 0x1, @local, 0x6}, 0x9df, [0x2a, 0x20000000000, 0x20, 0x8, 0x3, 0x6, 0x40, 0xffffffff7fffffff]}, 0x5c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) write$P9_RWSTAT(r4, &(0x7f00000000c0)={0x7, 0x7f, 0x1}, 0x7) 03:34:01 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x8847}}}}}}}}}, 0x0) 03:34:01 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x700000000000000, 0x0) 03:34:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x200000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:01 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x4000, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x1000, 0x4) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0xfffffffffffffffc) link(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 03:34:01 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffffe, 0x0) 03:34:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x0) epoll_pwait(r0, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x1, &(0x7f0000000100)={0x6}, 0x8) 03:34:01 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x8848}}}}}}}}}, 0x0) 03:34:01 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x8864}}}}}}}}}, 0x0) 03:34:01 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x20000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000100)={{{@in=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@empty}}, &(0x7f0000000200)=0xe8) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = geteuid() ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000640)={0x1, &(0x7f0000000600)=[{0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f0000000680)={r4, 0x1}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000400)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x10000, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1600}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x800}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x200}}], [{@hash='hash'}, {@smackfsdef={'smackfsdef'}}, {@fowner_eq={'fowner', 0x3d, r3}}, {@fowner_gt={'fowner>', r5}}, {@pcr={'pcr', 0x3d, 0x29}}, {@obj_user={'obj_user', 0x3d, 'em1securityppp0'}}]}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:01 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000, 0x0) 03:34:02 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x800000000000000, 0x0) 03:34:02 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) exit(0x0) getdents64(r0, 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000000), 0x3, 0x99de) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x2cd, 0x40000) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000100), 0x4) alarm(0x2) 03:34:02 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x8906}}}}}}}}}, 0x0) 03:34:02 executing program 5: 03:34:02 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xedc000000000, 0x0) 03:34:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x300000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:02 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x900000000000000, 0x0) 03:34:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x10000) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2, 0x15, 0x9, 0x0, 0x27, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_x_nat_t_type={0x1, 0x14, 0xfce6}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e24, @empty}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x1, 0x0, 0x0, 0x972, {0x6, 0x32, 0x99c4, 0x8001, 0x0, 0x80000000, 0x0, @in6=@local, @in6=@mcast1}}, @sadb_sa={0x2, 0x1, 0x4d5, 0x7, 0x101, 0x51, 0x1}, @sadb_lifetime={0x4, 0x2, 0x5, 0x7, 0x40, 0x80}, @sadb_ident={0x2, 0xb, 0x1, 0x0, 0x8}, @sadb_address={0x5, 0x17, 0xff, 0x20, 0x0, @in6={0xa, 0x4e21, 0x8, @ipv4={[], [], @loopback}, 0x40}}, @sadb_lifetime={0x4, 0x4, 0x1ff, 0x0, 0x100000001, 0x819}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e22, @local}}, @sadb_x_nat_t_port={0x1, 0x17, 0x4e20}]}, 0x138}}, 0x10) 03:34:02 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0xf000}}}}}}}}}, 0x0) 03:34:02 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0xf0ffff}}}}}}}}}, 0x0) 03:34:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x80) chroot(&(0x7f0000000080)='./file1\x00') r0 = syz_open_dev$dmmidi(&(0x7f00000003c0)='/dev/dmmidi#\x00', 0x101, 0x400) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000640)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40400000}, 0xc, &(0x7f0000000600)={&(0x7f0000000480)={0x148, r1, 0x300, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0x30, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @remote}}, {0x14, 0x2, @in={0x2, 0x4e21, @loopback}}}}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffff3e7}]}, @TIPC_NLA_BEARER={0x74, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x7, @empty, 0x7fffffff}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x6, @dev={0xfe, 0x80, [], 0x15}, 0x7}}}}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xd557}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x1}, 0x50) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x101000, 0x0) recvmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000000c0)=""/90, 0x5a}, {&(0x7f0000000140)=""/240, 0xf0}, {&(0x7f0000000240)=""/99, 0x63}], 0x3, &(0x7f0000000300)=""/93, 0x5d}, 0x12042) 03:34:02 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000000, 0x0) 03:34:02 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xa00000000000000, 0x0) 03:34:03 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) exit(0x4) getdents64(r0, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40, 0x0) r2 = semget(0x1, 0x0, 0x414) semctl$GETNCNT(r2, 0x4, 0xe, &(0x7f0000000180)=""/50) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f00000000c0)={0x401, 0x2, 'client0\x00', 0x4, "980847aefdc5b408", "2e64126cb41d271a23e15e987938100c5bce863e2fe63580b5a4719f911bc18c", 0x3, 0x4}) 03:34:03 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x1000000}}}}}}}}}, 0x0) 03:34:03 executing program 5: r0 = getpgid(0xffffffffffffffff) ptrace$setsig(0x4203, r0, 0x0, &(0x7f0000000040)={0x32, 0x9, 0x9}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x400000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:03 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x7ffffffffffff, 0x0) 03:34:03 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1f00000000000000, 0x0) 03:34:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x40) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x29}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, r1, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x35ff}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1e}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x40400c0) 03:34:03 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x2000000}}}}}}}}}, 0x0) 03:34:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syncfs(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd/3\x00') poll(&(0x7f0000000140)=[{r0, 0x8}], 0x1, 0x401) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000000180)={0x4, &(0x7f0000000080)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @broadcast}]}) 03:34:03 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x8000000}}}}}}}}}, 0x0) 03:34:03 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10000000000000, 0x0) 03:34:03 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000000000000, 0x0) 03:34:04 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) exit(0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) getdents64(r0, 0x0, 0x0) 03:34:04 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x8060000}}}}}}}}}, 0x0) 03:34:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x500000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:04 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x40000000000000, 0x0) 03:34:04 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2010000000000000, 0x0) 03:34:04 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0xd000000}}}}}}}}}, 0x0) 03:34:04 executing program 5: stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:04 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100000000000000, 0x0) 03:34:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x124) r0 = socket$inet_dccp(0x2, 0x6, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x4}, 0x68) 03:34:04 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x20000000}}}}}}}}}, 0x0) 03:34:04 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2300000000000000, 0x0) 03:34:04 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x28000000}}}}}}}}}, 0x0) 03:34:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x600000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x2c00, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x2, 0xffffffff80000001, 0x6, 0x3, 0x74}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000140)={0x2, 0x8200, 0x20, 0x8001, r1}, 0x10) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000040)) 03:34:05 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x30000000}}}}}}}}}, 0x0) 03:34:05 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x200000000000000, 0x0) 03:34:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) exit(0x0) getdents64(r0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) r2 = geteuid() syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x9, 0x7, &(0x7f0000000500)=[{&(0x7f0000000100)="4ddcbc3239bb3721cb4dcf1a2e302c790f2a9879f270ff5190865879dbd0ed69b56c6c59c920d89d632c1b008560dcdea9d94d905e8334475333975f0d097cbf24b2c297ca50b048285ffc700c97efc5a72d8369bd", 0x55, 0xbc99}, {&(0x7f0000000180)="33b31120d94ec8dc9c7d3364e7604e03fcd2c16167df3f35c4", 0x19, 0x64}, {&(0x7f00000001c0)="4432fa64967c8c9fd647b5388a714ef7829447cc7d7bdd5aee5e14eb2ad3654ed87ce22dc97dfc4215bf3b21d774ce2680515220fe8fde9a4ec11c6f653e103c2c34098a6eeb14ca10b5bc1027efeecd0a874b39099384db51da4956965ef7b4a8098d9329664b23df670871b1d4a47b9a17d65bdd0e92a0bee041fae0275a34786ce857362f63d1306e14ab0ed32e9cbe24e9f470c2fc0601b082b4276ff67cefb60efd8a49097e2dd38972aa4f769e62fe424f338fa297bae429a5", 0xbc, 0x5}, {&(0x7f0000000280)="40b62fb51e8a41bd47cf9bb11696ea97e1ca955bab1fbf64b2309aa8adc7e9e719c060a2a04449fc55bb300e1a960b9a48161fb80962c770e96dd8c5e6f35b68f0d0c5e80595a0cfbc9d115a36810ffbafeac6800ddae8bf6b9b82a0222c9c36bfaa130bb6f94579e989c66b6d958779a8e2d1c8429343244e8d8b92f641a333b0b977c8efa6a990a2ae942445bde1d87b2aff07d556c3eb6040bc5fa894b7ead2c98eb87bad077aacfe", 0xaa, 0x1}, {&(0x7f0000000340)="b946e2d671a3211c189fae2f827e006642586468db39f503ea211d8c955b0e7fd10dddbcc9888025e25eee0b1c885cd64de817fc409b298a960b78dfbb90fb038944e8c25c1f7dbe24d1a89eb35bd7fe90c565c409bc7eec9bc0c2130420da563e71ce270fd99d1d776e49d0a6ce0396e32bc64eef912c3fc44126ba5ae66b51e6fb1a2019eabf709c7b74602c72e5794bd309e7284dc717b1127751de9d3823f98064a2aa4c7cc1c41ccd4c5facf713257d7ee780ae3042b0248ce9297b00b10d97", 0xc2, 0x7}, {&(0x7f0000000440)="7d8e6fd641847f4ffba77ba472528a5e5357a88372e57d75286bdfaaaa2e9f506978b8456ff7b79fde1c0bfc75d28fb4e13ddc84674da7e9a7dac2f2a580632cd215a15cd00f4e05ce061df84818ef4398f10150810ede00911a81d7407806401656271703472249e2c399ccf0776ef3ede63945261ce0b19fc3", 0x7a}, {&(0x7f00000004c0)="150672e5f6462769acf1340df4213abee97ef990696a9e4fa6a7bfeae3d920132cab6a3b503e276ee0e3d31eadcbb9369232c41691ff9ce5db4902160122bc", 0x3f, 0x8}], 0x2, &(0x7f0000000640)=ANY=[@ANYBLOB='jqfmt=vfsv0,resuid=', @ANYRESHEX=r1, @ANYBLOB="2c7768696e745f6d6f6400fcffffffffffff4d67756f74613d6e6f646576766d6e657430ec6f5d2c7265737569643d", @ANYRESHEX=r2, @ANYBLOB=',jqfmt=vfsv0,nodiscard,noinline_xattr,noheap,defcontext=root,\x00']) 03:34:05 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x230f000000000000, 0x0) 03:34:05 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x3f000000}}}}}}}}}, 0x0) 03:34:05 executing program 5: mkdir(&(0x7f0000000140)='./file0/file0\x00', 0xffffffffffffffff) r0 = semget(0x2, 0x4, 0x2000000000000100) r1 = creat(&(0x7f0000000000)='./file0/file0\x00', 0xd) recvfrom$unix(r1, &(0x7f0000000040)=""/5, 0x5, 0x40000140, &(0x7f0000000080)=@file={0x1, './file0/file0\x00'}, 0x6e) semctl$GETZCNT(r0, 0x3, 0xf, &(0x7f0000000200)=""/107) 03:34:05 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x43050000}}}}}}}}}, 0x0) 03:34:05 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x100) 03:34:05 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x300000000000000, 0x0) 03:34:05 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00000000000000, 0x0) [ 917.276271][T12130] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 917.311906][T12130] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 917.345434][T12130] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:34:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x700000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:06 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x48000000}}}}}}}}}, 0x0) 03:34:06 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) mkdir(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff) [ 917.394692][T12130] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 03:34:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x410000, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000140)={0x47, 0x80000001, 0xb, 0x3, 0x0, 0x81}) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@ng={0x4, 0x7, "a403ca8a9f748379cae8e583ed"}, 0xf, 0x1) [ 917.975641][T12160] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 917.991171][T12160] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 918.000530][T12160] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 918.016070][T12160] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 03:34:06 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) exit(0xfffffffffffff706) getdents64(r0, 0x0, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 03:34:06 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x60000000}}}}}}}}}, 0x0) 03:34:06 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x400000000000000, 0x0) 03:34:06 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000000, 0x0) 03:34:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x80, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x3, 0x6031, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000140), &(0x7f0000000200)=0x4) mremap(&(0x7f0000a94000/0x2000)=nil, 0x569000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) utimensat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x2710}, {0x0, 0x7530}}, 0x100) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000100)={0xffffffff}) 03:34:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x900000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:06 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x800e0000}}}}}}}}}, 0x0) 03:34:06 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x80350000}}}}}}}}}, 0x0) 03:34:07 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x500000000000000, 0x0) 03:34:07 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4800000000000000, 0x0) 03:34:07 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x81000000}}}}}}}}}, 0x0) 03:34:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0xa00000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:07 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x86ddffff}}}}}}}}}, 0x0) 03:34:07 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x600000000000000, 0x0) 03:34:07 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4c00000000000000, 0x0) 03:34:07 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7354, 0x8000) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x2, 0x9) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x8fe, 0x0) bind$bt_sco(r1, &(0x7f00000000c0)={0x1f, {0x5, 0x9, 0x3, 0x1, 0x4, 0x1}}, 0x8) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) exit(0x0) getdents64(r2, 0x0, 0x0) 03:34:08 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x101f) 03:34:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x1000000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:08 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x88470000}}}}}}}}}, 0x0) 03:34:08 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x700000000000000, 0x0) 03:34:08 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x6800000000000000, 0x0) 03:34:08 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x88480000}}}}}}}}}, 0x0) 03:34:08 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x2) exit(0x0) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x9, 0x20000) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000100)) getdents64(r0, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x1, 0x80001) 03:34:08 executing program 5: 03:34:08 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x88640000}}}}}}}}}, 0x0) 03:34:08 executing program 5: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x5, 0x604000) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000080)=0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001740)={'bond0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001780)={@mcast2, @ipv4={[], [], @local}, @rand_addr="ef0b7aadb0cb6412a82d1162d3f5e4a6", 0x7fffffff, 0x1, 0x8, 0x100, 0x1, 0x10080, r1}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:08 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x6c00000000000000, 0x0) 03:34:08 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x88a8ffff}}}}}}}}}, 0x0) 03:34:09 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x800000000000000, 0x0) 03:34:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x1f00000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:09 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x80000) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x6, 0x200003) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00', 0x22, 0x9, 0x2, 0x9, 0x8001, 0xa8, "40700b0f3bccb14cfffc70d2da3d3f7cf1111e142d838fb4342af81c8fa6fad1d976"}, 0x13a) 03:34:09 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x88caffff}}}}}}}}}, 0x0) 03:34:09 executing program 5: 03:34:09 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x900000000000000, 0x0) 03:34:09 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) exit(0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x80000001, 0x20000) ioctl$SIOCX25SCALLUSERDATA(r1, 0x89e5, &(0x7f00000000c0)={0x33, "180980a4a31ed8205f435af54361468aa8daa9973dc9a8ee9cdf88f02a7abca6ae3ae669603130d0cebdf2d43715b69dbe1032fd3d2dc09798876eff3986e55552262406c5b73d9e99f8a22c15aca224cd9c61b85464293859b59d7c362199e38eb4e1c6cf9fc9eea812ad7f94273765ac456da5b2ea3eed0bd9f83ddd838fc1"}) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000000180)={0xf, ""/15}) getdents64(r0, 0x0, 0x0) 03:34:09 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x89060000}}}}}}}}}, 0x0) 03:34:09 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x7400000000000000, 0x0) 03:34:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') uselib(&(0x7f0000000040)='./file0\x00') 03:34:09 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xa00000000000000, 0x0) 03:34:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x2000000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x60) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140)={0x0, 0x9, 0xfffffffeffffffff}, &(0x7f0000000180)=0x8) recvmsg(r0, &(0x7f0000000680)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @link_local}}, 0x80, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/31, 0x1f}, {&(0x7f0000000300)=""/123, 0x7b}, {&(0x7f0000000380)=""/12, 0xc}, {&(0x7f00000003c0)=""/13, 0xd}, {&(0x7f0000000400)}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/159, 0x9f}], 0x7, &(0x7f00000005c0)=""/183, 0xb7}, 0x40002040) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={r1, 0x7ff, 0x2}, &(0x7f0000000200)=0xc) arch_prctl$ARCH_SET_GS(0x1001, 0x519c0000000) r2 = getpgid(0x0) r3 = syz_open_procfs(r2, &(0x7f0000000700)='net/nfsfs\x00') getsockopt$TIPC_SOCK_RECVQ_DEPTH(r3, 0x10f, 0x84, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0xc4842, 0x0) ioctl$UFFDIO_WAKE(r4, 0x8010aa02, &(0x7f00000006c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}) 03:34:09 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0xffffa888}}}}}}}}}, 0x0) 03:34:09 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0xffffca88}}}}}}}}}, 0x0) 03:34:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x42) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="2f6465762f6c6f6f703000028ef1d29866ed3700a7e62db098f2c888dac7706ab8ae6fba4f9f0c4ad2a278a60aca2b4ceb5b7a06961b18f0cc749537891f5e103f4311eadbfb5d7c4b5d9423071ad2ca7db56a13817ac7faab4d26b6d9488a31c996d3597ac08a78d9007b343b8a1361ef4f504384c70f7ab908f234153e7ea5aa516df8eb40386656f1d953b3792c0000000000000000000000000000"], &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='gfs2\x00', 0x800000, 0x0) 03:34:09 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1f00000000000000, 0x0) 03:34:10 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x7a00000000000000, 0x0) [ 921.414316][T12305] gfs2: not a GFS2 filesystem 03:34:10 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) exit(0x0) getdents64(r0, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000000)) 03:34:10 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0xffffdd86}}}}}}}}}, 0x0) 03:34:10 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000000000000, 0x0) 03:34:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x230f000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) getpriority(0x0, r0) 03:34:10 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x0) 03:34:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:10 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0xfffff000}}}}}}}}}, 0x0) 03:34:10 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000000000000, 0x0) 03:34:10 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0xf0ffffffffffff}}}}}}}}}, 0x0) 03:34:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x2b00000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:11 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2010000000000000, 0x0) 03:34:11 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) exit(0x0) getdents64(r0, 0x0, 0x0) 03:34:11 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x2, 0x400000) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0x8) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000001c0)={0xaa, 0x2}) ioctl$sock_ifreq(r0, 0x8937, &(0x7f0000000240)={'nlmon0\x00', @ifru_names='ip6gretap0\x00'}) write$P9_RAUTH(r0, &(0x7f0000000140)={0x14, 0x67, 0x2, {0x0, 0x3, 0x8}}, 0x14) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000100)=@int=0x98800000000, 0x4) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000180)={0x5, 0x8, [0x4, 0x8000]}) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) 03:34:11 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x100000000000000}}}}}}}}}, 0x0) 03:34:11 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff00000000, 0x0) 03:34:11 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2300000000000000, 0x0) 03:34:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x2d00000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:11 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x200000000000000}}}}}}}}}, 0x0) 03:34:11 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) 03:34:11 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x800000000000000}}}}}}}}}, 0x0) 03:34:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x80, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000100)={@mcast2, 0x0}, &(0x7f0000000140)=0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'gre0\x00', 0x1}) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20800}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)=@deltfilter={0xfc, 0x2d, 0x2, 0x70bd28, 0x25dfdbfd, {0x0, r1, {0xf, 0x8}, {0xffff}, {0x4, 0xa}}, [@TCA_RATE={0x8, 0x5, {0xfffffffffffff098, 0x2}}, @TCA_RATE={0x8, 0x5, {0x5, 0x57aa65e6}}, @TCA_CHAIN={0x8, 0xb, 0x2}, @filter_kind_options=@f_rsvp6={{0xc, 0x1, 'rsvp6\x00'}, {0x94, 0x2, [@TCA_RSVP_PINFO={0x20, 0x4, {{0x5, 0x80000000}, {0xffffffffffffffff, 0xc000, 0x5d69}, 0x16, 0x3, 0x7}}, @TCA_RSVP_POLICE={0xc, 0x5, @TCA_POLICE_RESULT={0x8}}, @TCA_RSVP_SRC={0x14, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @TCA_RSVP_SRC={0x14, 0x3, @loopback}, @TCA_RSVP_SRC={0x14, 0x3, @empty}, @TCA_RSVP_CLASSID={0x8, 0x1, {0x8, 0xa}}, @TCA_RSVP_DST={0x14, 0x2, @ipv4={[], [], @loopback}}, @TCA_RSVP_POLICE={0xc, 0x5, @TCA_POLICE_AVRATE={0x8}}]}}, @TCA_CHAIN={0x8, 0xb, 0xfffffffffffffe42}, @TCA_CHAIN={0x8, 0xb, 0x40}, @TCA_CHAIN={0x8}, @TCA_CHAIN={0x8, 0xb, 0x200}]}, 0xfc}, 0x1, 0x0, 0x0, 0x11}, 0x40) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000380)) acct(&(0x7f0000000040)='./file0\x00') syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x1) 03:34:11 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xf4ffffff00000000, 0x0) 03:34:11 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x230f000000000000, 0x0) [ 923.330886][T12381] QAT: Invalid ioctl [ 923.350765][T12381] QAT: Invalid ioctl [ 923.364429][T12381] QAT: Invalid ioctl [ 923.369880][T12384] QAT: Invalid ioctl 03:34:12 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000001040)={0x18}, 0x18) r1 = open$dir(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) exit(0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)=0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0xc3, 0x40) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, &(0x7f0000000180)={0xf000, 0x0, 0x7, 0x5}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0x5, &(0x7f00000000c0)='-/\x96%\x00'}, 0x30) setpgid(r2, r4) getdents64(r1, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0)='iso9660\x00', &(0x7f0000000200)='./file0\x00', 0x8d, 0x7, &(0x7f0000000700)=[{&(0x7f0000000240)="a5b1cc93ca3e31dad1f5664729bf13f6f389e91c310b46a4984f79c8e8d68185ac", 0x21, 0x800}, {&(0x7f0000000280)="222d11dafcf67e391f6dd312bd1cf3f123391d404e4137c70058b3b21380698acd164f7b85a3205ee8089180a24791be93be39562bf2e2d79c47e6e2a79f7888a71595f5082ddc7f07f9c89d95a5a9be990548bad9bf22e1ee9689ab5dfe24ea2484a8d407de4562d4ca406c861861833d6063c4", 0x74, 0x1ff}, {&(0x7f0000000300)="009975fe3e9aa1deba683586d9f9b3f718a4ea60d333387df8d9dd0e11afa21a10ec75b4c1e30f17e255c5119c34439cc3ac97d315404ce8c3bd3417a7753073ee7b8ab531b632f80ed22b4ba30d3521cb61e1052084cfe30407563b7dc1883088315d9cc0e7e09ce0530d0b3acf8cdc9e4dcba91242484d6068a9258682dd1bd83e84b4a5f2e40069283a5b988b01b4f1273cfc3b37917ea014565a7eb12d07017e3a7bcc13c6d88c0adfb69c383ca23efa25317b", 0xb5, 0xcd8}, {&(0x7f00000003c0)="54da5c485c52ce6c54681fa26e34cf55e1e0255ddefa3bb9fbcde41a1da1f16bc9aa514ce267a2a9722d244c19484c26279420bdceb3388a9ad67d0f507cdcedeb1b3f99e8e9a5d06aa691494a3f6bad659284283657fac8862f2020fad576feb706b79d8543966bb68eda61b2e5124d20c6262068940ec3e65c1d5b5dcd954365026db7", 0x84, 0xf177}, {&(0x7f0000000480)="7313670d0536891532fa6b8d3269dd4e20af61bfe0d1ae73d4661157f819ffae1d938957c69f13a993a2ae2c3d5a951dda6149af528997f34d68546588c0c3acf98ee49d64df31562cc229735f5c855945b7c3fac02a6c82196d29a86058bc31b3cd392879314e4ddee87d3dd77281db6a167433616c5a3b632cd86fbf6c60c20c28ec29d511442850f10165e5b63e9ad9cfab55488aefd438", 0x99, 0xff}, {&(0x7f0000000540)="bd9b7585ffa7f0eaaaf524a4cdfb5fa6901eedd31e2ebe2ebb346618e2fd7f357dd9d3572240d0c24c7d2e913021124cde1b2c3ecc4c03f662af281ac3720ba361c451a2cdfd702bd86fc9f73b90704c45b14aa4106816a12cbef1269d3a1c5cc785aa1833503ca575352ee7a8bc4e73acdc0c44d02af4ed62a0140c62914638544c20b405e7f1cd", 0x88, 0x5}, {&(0x7f0000000600)="2d80fe0b888322c175f7733dd98ed8ba9e0ee18368cae4db1025897d3036f41fe80a6e529595644e3b9554bf026abb7a1018a500e0ae3b651d7580e3dd1a45613bfe96c53a182feabe3b8a4811420db808633fdc73afa388c494829546ef3ddde46671dd7a032929b91a3cc17e423f4ecaf7e75183c18152d8c4d16182391fbbb006f7174199c67f7cf589acc0dc099d9da1b64f68245313a4030b631dde66525991c63525268e9538e1efec62608603f3723bfa267a8648d0da7ccdc90b2f3cb6f4ada7b8457770", 0xc8, 0x6}], 0x0, &(0x7f00000007c0)={[{@map_normal='map=normal'}, {@mode={'mode', 0x3d, 0x100}}], [{@appraise_type='appraise_type=imasig'}, {@obj_role={'obj_role', 0x3d, 'system/nodevppp1cpuset'}}, {@obj_role={'obj_role', 0x3d, 'posix_acl_accesseth0\'procmime_type,mime_type\x8f'}}, {@audit='audit'}]}) 03:34:12 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x806000000000000}}}}}}}}}, 0x0) 03:34:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x3b00000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:12 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x10020006007, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='ext4\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x80, 0x0) r2 = gettid() write$P9_RGETLOCK(r1, &(0x7f0000000200)={0x28, 0x37, 0x1, {0x2, 0x1, 0x7, r2, 0xa, '^{@8cgroup'}}, 0x28) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) waitid(0x1, r3, &(0x7f0000000080), 0x0, &(0x7f0000000100)) ioctl$SIOCRSGL2CALL(r1, 0x89e5, &(0x7f0000000240)=@default) 03:34:12 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xf5ffffff00000000, 0x0) 03:34:12 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00000000000000, 0x0) 03:34:12 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0xd00000000000000}}}}}}}}}, 0x0) 03:34:12 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x2000000000000000}}}}}}}}}, 0x0) [ 924.092553][ T2488] print_req_error: 1109 callbacks suppressed [ 924.092563][ T2488] print_req_error: I/O error, dev loop10, sector 2 flags 0 [ 924.116563][T12398] EXT4-fs (loop10): unable to read superblock 03:34:12 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000000, 0x0) 03:34:12 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0xcc) 03:34:12 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x2800000000000000}}}}}}}}}, 0x0) 03:34:13 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff00000000, 0x0) 03:34:13 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) exit(0x3) getdents64(r0, 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8001, 0x40600) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000100)={[], 0x9, 0x9, 0x2ec, 0x7fff, 0x7, r2}) 03:34:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x3f00000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:13 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x3000000000000000}}}}}}}}}, 0x0) 03:34:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x8, 0x109000) flock(r0, 0x6) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000080)=0x9000, 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000100)=0x8) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x4000, 0x0) 03:34:13 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4800000000000000, 0x0) 03:34:13 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xf9fdffff00000000, 0x0) 03:34:13 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x3f00000000000000}}}}}}}}}, 0x0) 03:34:13 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x5) 03:34:13 executing program 5: open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:13 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfbffffff00000000, 0x0) 03:34:13 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4c00000000000000, 0x0) 03:34:13 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x4305000000000000}}}}}}}}}, 0x0) 03:34:14 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) exit(0x0) getdents64(r0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x410000) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f00000000c0)=0x9, 0x4) 03:34:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x4000000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x40000, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 03:34:14 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x4800000000000000}}}}}}}}}, 0x0) 03:34:14 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfcfdffff00000000, 0x0) 03:34:14 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x6800000000000000, 0x0) 03:34:14 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x6000000000000000}}}}}}}}}, 0x0) 03:34:14 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") 03:34:14 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x800e000000000000}}}}}}}}}, 0x0) 03:34:14 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfdfdffff00000000, 0x0) 03:34:14 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x6c00000000000000, 0x0) 03:34:14 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x8035000000000000}}}}}}}}}, 0x0) 03:34:15 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x2, 0x2000) setsockopt$TIPC_MCAST_REPLICAST(r1, 0x10f, 0x86) exit(0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x80, 0xb) getdents64(r0, 0x0, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000240), &(0x7f0000000280)=0x4) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x58, r2, 0x300, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x44, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffe00}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7fffffff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x55}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x4008014}, 0x4008000) 03:34:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x4800000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000000140)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) 03:34:15 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x8100000000000000}}}}}}}}}, 0x0) 03:34:15 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfeffffff00000000, 0x0) 03:34:15 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x7400000000000000, 0x0) 03:34:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000180)="0f21edf20f090f0f210d9a007800001e0066ba6100ec660f72e6d9640f01d164f3dc3e0fe5aabc20ed6766ba2000b814b97074ef", 0x34}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:34:15 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x86ddffff00000000}}}}}}}}}, 0x0) 03:34:15 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x7a00000000000000, 0x0) 03:34:15 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f000000000000, 0x0) 03:34:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x4c00000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:15 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x8847000000000000}}}}}}}}}, 0x0) 03:34:16 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mq_open(&(0x7f0000000000)='*$\x00', 0xc0, 0x0, &(0x7f00000000c0)={0xffffffff, 0x8001, 0x9, 0x7fff, 0x4, 0xf0, 0x33, 0x8}) exit(0x0) getdents64(r0, 0x0, 0x0) 03:34:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x800000000003e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000640)=ANY=[@ANYBLOB="140000002200010000000000000000000400009095b50e8991101f7520c1aaf64b1214b1faf15b40959cf3b6255acba376d35d3f1fda274f927281aab60c943ae64718c94ae1b7b434738174bbc8d01846516700026f8ff2e84b9e2661b4e33c2ad69590c5652405ca208fcea66afb63590a6e21c854bc4606fb2ccd4860d688a4740d435a5c6f7a19b7a4415283333fe8cc4e71147fac8d3b59cb8c8351feef4f76305dbb21f56d9832ae044fae2b3d954db7ae793e6367d19d8ac766a4fd486d41249227cd1515faab68cabae1a509b6d4583c11b6dc500b3747c306023a396a9914e332e872b3c88aec3ba3f6c6ebeb7da8c5"], 0x1}}, 0x0) 03:34:16 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x8848000000000000}}}}}}}}}, 0x0) 03:34:16 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f00000000, 0x0) 03:34:16 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x0) 03:34:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x6000000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:16 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x8864000000000000}}}}}}}}}, 0x0) 03:34:16 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0x9208, 0x0) 03:34:16 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0) 03:34:16 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x88a8ffff00000000}}}}}}}}}, 0x0) 03:34:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:34:16 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000000000000, 0x0) 03:34:17 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x400, 0x84) exit(0x0) getdents64(r0, 0x0, 0x0) 03:34:17 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x88caffff00000000}}}}}}}}}, 0x0) 03:34:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x6800000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:34:17 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff00000000, 0x0) 03:34:17 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffff0700, 0x0) 03:34:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:34:17 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x8906000000000000}}}}}}}}}, 0x0) 03:34:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:34:17 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xf4ffffff00000000, 0x0) 03:34:17 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0xfffffffffffff000}}}}}}}}}, 0x0) 03:34:17 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffffff7f, 0x0) 03:34:18 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) exit(0x0) r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x2000000000000, 0x80) write$eventfd(r1, &(0x7f0000000140)=0x3, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$RTC_PLL_SET(r2, 0x40207012, &(0x7f00000000c0)={0x0, 0x9, 0x0, 0xfffffffffffffffc, 0x3, 0x40, 0x9}) getdents64(r0, 0x0, 0x0) 03:34:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x6c00000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:18 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x2}}}}}}}}}, 0x0) 03:34:18 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xf5ffffff00000000, 0x0) 03:34:18 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:18 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x8}}}}}}}}}, 0x0) 03:34:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:18 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0xd}}}}}}}}}, 0x0) 03:34:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:18 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff00000000, 0x0) 03:34:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x4000000000) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) exit(0x0) getdents64(r0, 0x0, 0x0) 03:34:19 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x28}}}}}}}}}, 0x0) 03:34:19 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x100, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) r1 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x4, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000180)=0x8000) io_setup(0x2, &(0x7f0000000200)=0x0) io_destroy(r2) 03:34:19 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x7400000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:19 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xf9fdffff00000000, 0x0) 03:34:19 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:19 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x30}}}}}}}}}, 0x0) 03:34:19 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:19 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfbffffff00000000, 0x0) 03:34:19 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x48}}}}}}}}}, 0x0) 03:34:19 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:20 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x200000, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x101000, 0x0) write$P9_RREADDIR(r1, &(0x7f00000000c0)={0x128, 0x29, 0x2, {0x4, [{{0x20, 0x1, 0x7}, 0x3f, 0x5, 0x7, './file0'}, {{0xc0, 0x1, 0x7}, 0x7fff, 0x3, 0x7, './file0'}, {{0x88, 0x4, 0x7}, 0x0, 0x1, 0xd, './file0/file0'}, {{0x1, 0x3, 0x3}, 0x7, 0x0, 0x7, './file0'}, {{0x8, 0x2, 0x3}, 0x7fffffff, 0x74a43973, 0x7, './file0'}, {{0x84, 0x1, 0x1}, 0x7f, 0xffff, 0x7, './file0'}, {{0x2c, 0x0, 0x4}, 0x7, 0xfffffffffffffc00, 0x7, './file0'}, {{0x50, 0x3, 0x5}, 0x81, 0x400, 0x7, './file0'}, {{0x2, 0x4, 0x2}, 0x800, 0x6, 0x7, './file0'}]}}, 0x128) exit(0x0) getdents64(r0, 0x0, 0x0) 03:34:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x7a00000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:20 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x60}}}}}}}}}, 0x0) 03:34:20 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:34:20 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:20 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfcfdffff00000000, 0x0) 03:34:20 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:20 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0xf0}}}}}}}}}, 0x0) 03:34:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:20 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x543}}}}}}}}}, 0x0) 03:34:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:20 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000480)={0x0, 0x7, 0x10}, &(0x7f00000004c0)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000500)={r1, 0x12}, 0x8) socketpair(0x4, 0xe, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MCAST_LEAVE_GROUP(r3, 0x29, 0x2d, &(0x7f00000000c0)={0xdc8, {{0xa, 0x4e23, 0xabc, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}}}, 0x88) r4 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x3, 0x2) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r4, 0x80dc5521, &(0x7f00000001c0)=""/35) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r3, &(0x7f0000000880)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000840)={&(0x7f00000005c0)={0x244, r5, 0x0, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0xd4, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa17d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}]}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x22}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @remote}}, {0x14, 0x2, @in={0x2, 0x4e23, @multicast1}}}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffff75}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x3c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8001}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA={0x70, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x41}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}]}, 0x244}}, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa00000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x128, r6, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x10c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'teql0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x67c80000000, @loopback, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e21, @loopback}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @empty}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast1}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ffe000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x80000000, @loopback, 0x3}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x400, @remote, 0x82}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}]}]}, 0x128}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) 03:34:21 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x10020006007, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='ext4\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x80, 0x0) r2 = gettid() write$P9_RGETLOCK(r1, &(0x7f0000000200)={0x28, 0x37, 0x1, {0x2, 0x1, 0x7, r2, 0xa, '^{@8cgroup'}}, 0x28) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) waitid(0x1, r3, &(0x7f0000000080), 0x0, &(0x7f0000000100)) ioctl$SIOCRSGL2CALL(r1, 0x89e5, &(0x7f0000000240)=@default) 03:34:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff00000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:21 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfdfdffff00000000, 0x0) 03:34:21 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x608}}}}}}}}}, 0x0) 03:34:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:21 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={0xffffffffffffff9c}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e23, @loopback}}, [0x8e, 0x1000, 0x4, 0xaf3e, 0x8, 0x1, 0x7, 0x2578, 0x101, 0x6, 0x5, 0x8, 0x5, 0x686884b0, 0x4]}, &(0x7f00000001c0)=0x100) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200)=@sack_info={r1, 0x6, 0x4a5}, &(0x7f0000000240)=0xc) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r2, 0x800, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x6c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9a0}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5d59}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x63070414}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x82c}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x39c5fcc000000000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x400}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x60}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0x20, 0x0) ioctl$SIOCX25GDTEFACILITIES(r0, 0x89ea, &(0x7f0000000300)) write$P9_RLINK(r3, &(0x7f00000002c0)={0xfffffffffffffe9f, 0x47, 0x1}, 0x7) 03:34:21 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x689}}}}}}}}}, 0x0) 03:34:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) [ 932.750021][ T2488] print_req_error: I/O error, dev loop8, sector 2 flags 0 [ 932.758546][T12742] EXT4-fs (loop8): unable to read superblock 03:34:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:21 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x806}}}}}}}}}, 0x0) 03:34:21 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002740)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000002840)=0xe8) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xea8, 0xa, &(0x7f0000002640)=[{&(0x7f0000000100)="84039f302730fa284215b6eb880bf18f8f86644491452238aebce593560a22656ff35e22e9ce093d2953a010a7df50af324a2ca0990f95ab9c8075e42789028c84", 0x41, 0x9}, {&(0x7f0000000180)="a77b3801c22d5e", 0x7, 0x615d}, {&(0x7f00000001c0)="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", 0x1000, 0x8}, {&(0x7f00000011c0)="1842b69e9ed396758b0a18165a3a383916740a1c5bd1bb7ce7c8097f445852cfedc60dc025d34c9fc9e5fa12e809cb8d830affef729da1b0582bd8b549b2be64ada1bb9859a46d828a9b32543c0bc577c9cf4c7473af6dac68fd7f1eed7b708853dcd7df165c5ddba9b7e62c6fdeec083d310e758f928e850f9c3dbd7759935058", 0x81, 0x8}, {&(0x7f0000001280)="53ac15d222c23f80b2f45e44652288ca82de6501d3b90dfa7a2c24b30e3ddc889e7a6641710110fb43163b93adf6ca4190cc401bbcf6437000fa0577c2c8f135f5d05446465ced59bebb8b577f696b735a7dfe12c7d81647862ee6a34c50e61cab9139c8daa9c23361f692824dbba2fa939b7e284de5af937141c01b20d357b158bc766750f641403982914a3899f3ed641077cc687200c829a8a14710", 0x9d, 0xff}, {&(0x7f0000001340)="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", 0x1000, 0xfff}, {&(0x7f0000002340)="1738b66a424d6978236769bb9810c72e5b1ffcec3476160f0e1c2752a73ba891da84db5e9ebe5f1ac351fa96548146511136aee0b349ddef666b7cd0a4f5ff72fc4b0ca2f4f434c2c54996d2e16e3cc00d6fdd0a8ccf44d0f1396b416dca4b8081512b54d68274ff114ccf6dfd56560742dda54a86afc18a64d4aa400d2000c273de7fc2a1d1a51dbb9fecf71455e680951506081685f9c02bcf7b30a5a079447d92ed7d4c4e87fda558a5d77f0bd2d9696e31f89433484d3b1734e5ec9fa0b5cbf0e44827e92ef1cacfb4179eeff2cb313c854fc1140be261", 0xd9, 0x1}, {&(0x7f0000002440)="930c76607aec6637dc1b822ffec5bba5216fe07386e62596ac1c7d9fe97188feab4a7eaec1530881cd86c978915458fc40b1f7c1f7e7edf7885d9f79dae982b039576bb395bffc76f6638626b829e9d61e84a241832143826424f77cde032a9daea71de4a7378fb894ee11cf6fbaa720139d47fe4453979e463e2a4ca5b5f074066d144a3a", 0x85, 0x8000}, {&(0x7f0000002500)="40fe1e7e9feca5", 0x7, 0x9}, {&(0x7f0000002540)="150518be1d6657b009c41425a49d076cb1bcf52060d9bc35e65d12bfdd1792e43c628f3e8e34c26a1fa868966aea59f3ed88dbec2f51623d67b68885c708a4b8e303514b15d8d24af6abe4d69e93835658ca2f5ba0498c794d8e2757da254f1f9cb06d38a5a9bf4b0c103b76094c40ac30474ffd69ef8cea644e2023afba3d0e232c81e59da9ecea08e252ba09f6621b46406792d91d0753f420656f8adbb20fd1434e6547594a44fc74a40f569f8b35551e61b5e29e0d403ee9552ee995eb3ce6ce41e12c9d45e7fd3b29d68d094a6bfc148313673a495afb441f9dc7fa", 0xde, 0xfff}], 0x4000, &(0x7f0000002880)={[{@case_sensitive_yes='case_sensitive=yes'}, {@case_sensitive_yes='case_sensitive=yes'}, {@umask={'umask', 0x3d, 0x3}}, {@errors_recover='errors=recover'}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@fsuuid={'fsuuid', 0x3d, {[0x77, 0x7e, 0x38, 0x62, 0x76, 0x38, 0x7d, 0x35], 0x2d, [0x36, 0x31, 0x0, 0x31], 0x2d, [0x0, 0x31, 0x3c, 0x66], 0x2d, [0x35, 0x63, 0x3d, 0x77], 0x2d, [0x66, 0x77, 0x77, 0x37, 0x77, 0x7f, 0x7f, 0x76]}}}, {@fowner_lt={'fowner<', r0}}, {@subj_role={'subj_role', 0x3d, 'em1cpuset-'}}]}) r1 = accept4$inet(0xffffffffffffff9c, &(0x7f0000002980)={0x2, 0x0, @broadcast}, &(0x7f00000029c0)=0x10, 0x800) recvmsg(r1, &(0x7f0000004040)={&(0x7f0000002a00)=@in6={0xa, 0x0, 0x0, @empty}, 0x80, &(0x7f0000003f40)=[{&(0x7f0000002a80)=""/204, 0xcc}, {&(0x7f0000002b80)}, {&(0x7f0000002bc0)=""/10, 0xa}, {&(0x7f0000002c00)=""/220, 0xdc}, {&(0x7f0000002d00)=""/46, 0x2e}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/3, 0x3}, {&(0x7f0000003d80)=""/35, 0x23}, {&(0x7f0000003dc0)=""/181, 0xb5}, {&(0x7f0000003e80)=""/131, 0x83}], 0xa, &(0x7f0000004000)=""/22, 0x16}, 0x40000140) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000002b80)='/dev/snd/pcmC#D#c\x00', 0x81, 0x18800) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000004080)={0x1bf, 0xd47, 0x9, @broadcast, 'nr0\x00'}) 03:34:21 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfeffffff00000000, 0x0) 03:34:21 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) exit(0x0) getdents64(r0, 0x0, 0x0) 03:34:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0xc000000000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:21 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0xd00}}}}}}}}}, 0x0) 03:34:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) [ 933.128178][T12764] ntfs: (device loop2): parse_options(): Unrecognized mount option defcontext. [ 933.162722][T12764] ntfs: (device loop2): parse_options(): Unrecognized mount option func. 03:34:21 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f000000000000, 0x0) 03:34:21 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0xe80}}}}}}}}}, 0x0) 03:34:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) [ 933.209382][T12764] ntfs: (device loop2): parse_options(): Unrecognized mount option fsuuid. 03:34:21 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x2000}}}}}}}}}, 0x0) 03:34:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:22 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x1063b, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f00000000c0)={0x6, 0xff0000000000000, 0x4, 0xfff}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:34:22 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x2800}}}}}}}}}, 0x0) 03:34:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0xf5ffffff00000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:22 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x3000}}}}}}}}}, 0x0) 03:34:22 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f00000000, 0x0) 03:34:22 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x468141, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) 03:34:22 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x3580}}}}}}}}}, 0x0) 03:34:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:22 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x3f00}}}}}}}}}, 0x0) 03:34:22 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8, 0x2) write$UHID_INPUT2(r0, &(0x7f00000000c0)={0xc, 0x73, "4317ec4b653add2b127350c9d69f44f99d67cb8d5ac712563d73b6e2ea2faf483db193ad510d2c623f84a81f2ff84b747de01a48e5e6fbfc4a2078308e39be9b956e2c25b817b19b8dcdefbea302c188b5e5587089bbcb7b0091a6cd35ae842b59822012bd87be8612d427b77354720a38cfca"}, 0x79) 03:34:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:22 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0) 03:34:22 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x4305}}}}}}}}}, 0x0) 03:34:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0xf6ffffff00000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:23 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x4788}}}}}}}}}, 0x0) 03:34:23 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x20040, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f00000000c0)={'veth0_to_hsr\x00', @broadcast}) getgroups(0x7, &(0x7f0000000280)=[0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0]) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="1bbb7ce0ac2d62b3461a7b046c95b638ae4911c321622a6d7c14c4ffb2976376b2356444e9722e5ca8a77cd06357f700a48ff2ed529b7f9b1b2cf97a957a794778711dd4fbb0ee70a26f0dcf3d78ed48eb3173ecacd93bd18371ce14e519faece9e0312858b2b51ece201383d9c11644aec4cc130ec3c5b5617bf17f315951c30be8f5db876b552edc43f0a0265f8a81dc68c6ec0137711545", 0x99, 0x6}], 0x80400, &(0x7f0000000380)={[{@gid={'gid', 0x3d, r1}}, {@errors_continue='errors=continue'}, {@quota='quota'}, {@integrity='integrity'}, {@errors_continue='errors=continue'}], [{@euid_eq={'euid', 0x3d, r2}}, {@smackfsdef={'smackfsdef', 0x3d, '$^,keyring['}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@smackfstransmute={'smackfstransmute'}}]}) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffff03, 0x0, 0x410, 0x0) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) socket$alg(0x26, 0x5, 0x0) syslog(0x9, &(0x7f0000000440)=""/124, 0x7c) 03:34:23 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x4800}}}}}}}}}, 0x0) 03:34:23 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffff0700, 0x0) 03:34:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='\x00\x00\b\x00\b', 0x200002, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:34:23 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x4888}}}}}}}}}, 0x0) 03:34:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0xf8f73f0000000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, 0x0) 03:34:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:23 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x6000}}}}}}}}}, 0x0) 03:34:23 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffffff7f, 0x0) 03:34:23 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, 0x0) 03:34:23 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x6488}}}}}}}}}, 0x0) 03:34:23 executing program 2: lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x2) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:34:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, 0x0) 03:34:23 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:23 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x800e}}}}}}}}}, 0x0) 03:34:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0xfcfdffff00000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:23 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:23 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:23 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x8035}}}}}}}}}, 0x0) 03:34:23 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) write$P9_RREADDIR(r0, &(0x7f0000000100)={0x4f, 0x29, 0x1, {0x200, [{{0x22, 0x2, 0x1}, 0x6, 0x7, 0x7, './file0'}, {{0x30, 0x1, 0x8}, 0x4, 0x0, 0xd, './file0/file0'}]}}, 0x4f) syz_execute_func(&(0x7f0000000000)="c4c21dafe8660f3a0e7432c53a26660fd43d9e000000c4437bf0c508c4e179701397c401fc538100000000f20f2d30f3f716c483791d30fbc461716018") 03:34:24 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:24 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x8100}}}}}}}}}, 0x0) 03:34:24 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:24 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000000440)=0xe8) r2 = getuid() r3 = syz_open_procfs(0x0, &(0x7f0000000540)='sessionid\x00') ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000640)={0x80000001, 0x3, 0x101, 0x60f2, 0x7}) getsockopt$inet_buf(r3, 0x0, 0x2b, &(0x7f0000000740)=""/94, &(0x7f0000000600)=0x6acdceab174def8c) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0xc0, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000100)="2dd94298bccb6048ab7100900a6402af636353bd1e93f9a65dc2f135ff1d226803a2", 0x22, 0x6}, {&(0x7f0000000140)="830766cf506978c93d16acfef9346ba0598a1dec609adc9a3af6d109548758155da6cbadc253834017cc4fd9e5f656ce566a0da9b839425f905ccf", 0x3b, 0x1868}, {&(0x7f0000000180)="d9c0f61fe3dba0fd2f7646ff11a4cf71ada4735660cf2698371292fa40fb598142979b3a2b11355029d8b5fd14beb090ed15315b7389480caf6bc619", 0x3c, 0x7}, {&(0x7f00000001c0)="b49a10db8f5d194876f64e9a35cbf7e2c131f8b719e25e13861c312a50165d29977fc6a05ce27e85975063aded273ca5a155cdd5b41cdf73fd53f57c1681c33a6b998f934573ec00913298454b3f1797a3e29a364e0ea9f0092db739f070f2f1d6125a3f694edad6e817e14f5df097f82ca2b7fc8c0e698dd3a0be997080be92709153c772daf15bf5683cc9f956e073054b065b94449cee447af51413dfa3b9b048c1342bfda7b7f8685e4f56795e10ed73160c560b6ec88304be43a6f68a3af7eaddb45e985efc3323e4a5d5a12e57b16a537a2e47f6ce7dfe318ee97b4924b99fff32606f728810e04f8ef972af5cf443b9a116a5", 0xf6, 0xffffffffffff7fff}], 0x2000010, &(0x7f0000000680)=ANY=[@ANYBLOB='resize=0x00000000000004a2,quota,gid=', @ANYRESHEX=r0, @ANYBLOB=',uid=', @ANYRESHEX=r1, @ANYBLOB="2c756d61736b3d30783030307569643c51cc5cb7c390acffff74069fb2b0d2a9c472000000", @ANYRESDEC=r2, @ANYBLOB=',\x00']) 03:34:24 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x8847}}}}}}}}}, 0x0) 03:34:24 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40202, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f00000000c0)={0x7fffffff, 0x7fffffff, 0x3, 0x1, 0x14, 0x8}) 03:34:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0xfdfdffff00000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:24 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x8848}}}}}}}}}, 0x0) 03:34:24 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:24 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x8864}}}}}}}}}, 0x0) 03:34:24 executing program 2: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f00000003c0)='/dev/dmmidi#\x00', 0x855, 0x101) write$cgroup_type(r0, &(0x7f0000000400)='threaded\x00', 0x9) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x80000000, 0x440) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000100)={0x96, "95d2ed7b56d2ef407124d29c0a03bd2b475ddb6fc7bc6a3dbc3b61161959e4b3", 0x7, 0x0, 0x6, 0x5, 0x11, 0x3, 0x6, 0x9}) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x41) ioctl$EVIOCGBITSW(r3, 0x80404525, &(0x7f0000000180)=""/176) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r3, 0x6, 0x15, &(0x7f0000000440)=0x3, 0x4) readlink(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=""/100, 0x64) 03:34:24 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x8906}}}}}}}}}, 0x0) 03:34:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:24 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x4000) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x100ffd, 0x0) 03:34:24 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0xf000}}}}}}}}}, 0x0) 03:34:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0xffffffff00000000}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:24 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0xf0ffff}}}}}}}}}, 0x0) 03:34:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:24 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x40}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={r1, @in={{0x2, 0x4e21, @remote}}, 0x2, 0x8, 0x891, 0x76d, 0x40}, &(0x7f0000000200)=0x98) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:34:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:25 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x1000000}}}}}}}}}, 0x0) 03:34:25 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$radio(&(0x7f00000002c0)='/dev/radio#\x00', 0x0, 0x2) getsockopt$inet_dccp_buf(r0, 0x21, 0xe, &(0x7f00000000c0)=""/251, &(0x7f00000001c0)=0xfb) removexattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=@random={'system.', '\x00'}) 03:34:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:25 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x2000000}}}}}}}}}, 0x0) 03:34:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:25 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2a, 0x1) write$P9_RREMOVE(r0, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) 03:34:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0xffffffffffffffff}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:25 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x8000000}}}}}}}}}, 0x0) 03:34:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:25 executing program 0: getresgid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)=0x0) r1 = geteuid() fstat(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000100)="d48723104a50295109d800227d01424918c2c3319c1bc1244b43725658b25d46f6908535bcdee2552e46654d3c7a26c03251b0a9", 0x34, 0xffffffff}, {&(0x7f0000000140)="af9c9cd62fde6ad67eb8a23307988de21ad33452ec5d63fdeaa20949b42353cce7f81dec51594e4aef57a352c7b198b3e777d52d4b4cca9c4baddfc7", 0x3c, 0x400}], 0x22010, &(0x7f00000003c0)={[{@gid={'gid', 0x3d, r0}}], [{@dont_measure='dont_measure'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'jfs\x00'}}, {@hash='hash'}, {@euid_gt={'euid>', r1}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@uid_lt={'uid<', r3}}]}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:34:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:25 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x8060000}}}}}}}}}, 0x0) 03:34:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:25 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0xd000000}}}}}}}}}, 0x0) [ 936.920911][T13030] EXT4-fs (sda1): re-mounted. Opts: barrier=0xffffffffffffffff,debug_want_extra_isize=0x0000000000000000,data_err=abort, 03:34:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:25 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) getpeername(r0, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 937.081833][T13047] EXT4-fs (sda1): re-mounted. Opts: barrier=0xffffffffffffffff,debug_want_extra_isize=0x0000000000000000,data_err=abort, 03:34:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}, 0xa}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:25 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x20000000}}}}}}}}}, 0x0) 03:34:25 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x4000, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f00000000c0)={0xfffffffffffffffd, 0xffffffffffffffb5}) sendmsg$unix(r0, &(0x7f0000000300)={&(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000180)="a304ffdc2d028386aa5c0111507d93ed69e893cc686536cce82ff8e58769ef269e73415fd10c4fd03c5cb4f1c7238c25eb15405a70d8e5a0c9e95d3aa58ff70dedabb4d652c653f047c3a5962711f55146226332fcce258044141934b31b1a44c9079b4c3bc503d36e", 0x69}, {&(0x7f0000000200)="ac550d83655933bc84457628be8a94ec537a4e7b6d7f553b640094a1b77d247f4c38f1f5aa9b6ae3597ad3fa6ab69c1c976435b74f3bfd6276838af60abec7e1db5b356940b88ff0649632cf0c9f5a37b9701eac6f50be2cef5ded82605a0e9a714a9fd37d50509c7cc739df72a6ceb5ea16e1ee740f1cdb096cbeb3c8bcc2192f5e3f37749418702b128922218116ac7d4c0246df6eb8aed08c47226638ead5a5f0d9d7a3c51b", 0xa7}], 0x2, 0x0, 0x0, 0x80}, 0x4001) 03:34:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:25 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x28000000}}}}}}}}}, 0x0) 03:34:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:26 executing program 5: mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:26 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x30000000}}}}}}}}}, 0x0) 03:34:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:26 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x3f000000}}}}}}}}}, 0x0) 03:34:26 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x8048acada2fd4efa, 0x0) close(r0) [ 937.516546][T13071] EXT4-fs (sda1): Unrecognized mount option "barrier=0x0000000000000000 [ 937.516546][T13071] debug_want_extra_isize=0x0000000000000000" or missing value 03:34:26 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x43050000}}}}}}}}}, 0x0) [ 937.732214][T13091] EXT4-fs (sda1): Unrecognized mount option "barrier=0x0000000000000000 [ 937.732214][T13091] debug_want_extra_isize=0x0000000000000000" or missing value 03:34:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}, 0x2d}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:26 executing program 5: mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:26 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x48000000}}}}}}}}}, 0x0) 03:34:26 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0xc, 0xffdf, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xc7, 0x20c100) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f00000000c0)={0x5}) 03:34:26 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x0, 0x0, 0x0, 0x0) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xe8) getgroups(0x4, &(0x7f0000000200)=[0xee00, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff]) fchownat(r0, &(0x7f0000000000)='./file0\x00', r1, r2, 0x0) 03:34:26 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$caif_seqpacket(0x25, 0x5, 0x4) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000010c0)=""/142, &(0x7f0000000000)=0x8e) r1 = semget$private(0x0, 0x7, 0x105) semctl$GETPID(r1, 0x2, 0xb, &(0x7f00000000c0)=""/4096) 03:34:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:26 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x60000000}}}}}}}}}, 0x0) [ 937.967056][T13104] EXT4-fs (sda1): Unrecognized mount option "barrier=0x0000000000000000-debug_want_extra_isize=0x0000000000000000" or missing value 03:34:26 executing program 5: mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, 0x0) 03:34:26 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x800e0000}}}}}}}}}, 0x0) [ 938.107466][T13118] EXT4-fs (sda1): Unrecognized mount option "barrier=0x0000000000000000-debug_want_extra_isize=0x0000000000000000" or missing value 03:34:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}, 0x3b}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:26 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x80350000}}}}}}}}}, 0x0) 03:34:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, 0x0) 03:34:26 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3, 0x0) getpeername$tipc(r0, &(0x7f0000000040)=@id, &(0x7f0000000100)=0x10) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) bind$rose(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f00000000c0)={0x10}) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) 03:34:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, 0x0) 03:34:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400, 0x70) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x8) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000140)={0x0, 0x6, 0x3, 0x3, 0xca0, 0x8001000}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:34:27 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x81000000}}}}}}}}}, 0x0) 03:34:27 executing program 5: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:27 executing program 4: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$caif_seqpacket(0x25, 0x5, 0x4) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000010c0)=""/142, &(0x7f0000000000)=0x8e) r1 = semget$private(0x0, 0x7, 0x105) semctl$GETPID(r1, 0x2, 0xb, &(0x7f00000000c0)=""/4096) [ 938.438450][T13139] EXT4-fs (sda1): Unrecognized mount option "barrier=0x0000000000000000;debug_want_extra_isize=0x0000000000000000" or missing value 03:34:27 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x86ddffff}}}}}}}}}, 0x0) 03:34:27 executing program 5: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:27 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x88470000}}}}}}}}}, 0x0) [ 938.630278][T13155] EXT4-fs (sda1): Unrecognized mount option "barrier=0x0000000000000000;debug_want_extra_isize=0x0000000000000000" or missing value 03:34:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}, 0x8e}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:27 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x101200) getsockopt$rose(r0, 0x104, 0x7, &(0x7f0000000000), &(0x7f0000000180)=0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f0000000080)}, 0x10) 03:34:27 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x88480000}}}}}}}}}, 0x0) [ 938.984466][T13174] EXT4-fs (sda1): Unrecognized mount option "barrier=0x0000000000000000Ždebug_want_extra_isize=0x0000000000000000" or missing value 03:34:27 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x5a7, 0x20000) write$cgroup_type(r0, &(0x7f00000000c0)='threaded\x00', 0x9) 03:34:27 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x88640000}}}}}}}}}, 0x0) 03:34:27 executing program 5: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:27 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x88a8ffff}}}}}}}}}, 0x0) [ 939.119425][T13184] EXT4-fs (sda1): Unrecognized mount option "barrier=0x0000000000000000Ždebug_want_extra_isize=0x0000000000000000" or missing value 03:34:27 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000100)=0x30) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffff9c}) r2 = fcntl$dupfd(r0, 0x406, r0) write$smack_current(r2, &(0x7f0000000280)='&\x00', 0x2) accept4(r1, &(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000140)=0x80, 0xfffffffffffffffe) r4 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x8, 0x2000) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x2, 0x0, 0x1, 0x5, 0x80000001}, &(0x7f00000001c0)=0x20) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r2) 03:34:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'\nebug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:27 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x88caffff}}}}}}}}}, 0x0) 03:34:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0xf6ffffff) 03:34:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:28 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x89060000}}}}}}}}}, 0x0) 03:34:28 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x7ff, 0x162, 0x0, 0x200, 0x0) stat(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001700)={{{@in, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000001800)=0xe8) r2 = syz_open_dev$sndpcmc(&(0x7f0000001840)='/dev/snd/pcmC#D#c\x00', 0x4, 0x400000) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000001880)={0x5, 0x101, [{0xba6, 0x0, 0x10000}, {0x10001, 0x0, 0x8}, {0x1, 0x0, 0x7a9b}, {0x0, 0x0, 0x3}, {0xfffffffffffff461, 0x0, 0x9}]}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x8, &(0x7f0000001580)=[{&(0x7f0000000100)="8e14aa3924f8c65d0b388882ac13", 0xe, 0xbf}, {&(0x7f0000000140)="495ba3f94f89d641a75e8ab5798efa71ab769ead9be1b19b5db2660987d349613ad0057e52a666d378046d31054e401eec26f97d3f4e36c294147afa603ac009969f71874cc0bc7e53cbef5bf9ffad1833673258775a2f033c22868a2a47161d56f9db", 0x63, 0x6121}, {&(0x7f00000001c0)="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", 0x1000, 0x6}, {&(0x7f00000011c0)="77b0b63ac33564028510552973b823669b4e97cf0698eb5fc12ca3c4bf1b41706d564272d754d0d9059d62cea3e2de9dfb12cc06c0e7bd64206ccc751637c0a688dbde11403d5c7a922ee3d4e3ba047c2d52f593d7f448b501c3346816ae49bc478c1d7a3447f1dc99da2e8104f08beb454519b62133c23f718d0f865d725808eacbb55c38a3027f8a37bd9c366d786caf77a3843dcdc254f680d372b017a16f3a4b4f42f654ba6edfbbbbc1235eada0567f85b3b181b9395b78b01dfe7b090fa554da4b2ddbcf882216d3aadcb84fc37d", 0xd1, 0x7}, {&(0x7f00000012c0)="094d5db634b48e73d2eb52b81414907235701a0c1ca026e02c61ecb30ee1268609eb87b7225e4a3078943f4cfb6f43ab0cd4d7626bd21962a26e2c5a89ca6d7644d028b0a9a9e64c21558a1cc54a87cf74dcff68604732ce1f3e983eba91565162995e", 0x63, 0x80}, {&(0x7f0000001340)="1c1c6bcd15470b76f58f3a029b2b7abd8f7f4cf8d111c441303d22e17bff63fcbb6e2d984ddd35e5e7ce844156899c5cfb7868c7e7bd9f9b2fe04d6ac88f46f19d6c6303", 0x44}, {&(0x7f00000013c0)="262cc6edaa6f66f60ee2836b034c70ca8dcbb7f1d9d416aa8f7712fc14e70874a89a297c388dffaac012117f28d42e2a11cc62c02aa7f27d92748bb2c36844ef2c825657b7fdb571b6570686c16068f6d400ac81a19cc5f077098891fc8f85ef4d7ccf0e4c78724cdfe65b3227e203f1f966ad658e32babcc578806163131284763aa2719361c7a3629b6c32355b3a5a66e1bd1eff418f06611cb3ecf56a61399f8c29aade42df4401fbe4aa704c", 0xae, 0x6}, {&(0x7f0000001480)="da2c555c1b26424c4862b6dbfe5678e6cc851aeec406d7f260b2b251663ef3f382d208263a38f954a3be2f12cf6a94a7ceeec5f1a2f401293ff19798fc73b0cc516e654a8b427e0e7d487d949507d85bd1836ffe9f945af3d6068a8d386c0449250294d9e3c53d6f8079c3c021a2ab3a8fd5d9def88dc146d02e959123cf706e1526dad94117010b141a7344c7ee96826919808d19d2fd0bcc5210a588bbfa593687ed2e528e73ff2d10df99583d7944f69246c4e9b99f336bc9d13f8f7324c8ba582e07a10ab9dfc7388277ac182e1fc88d326de276fc", 0xd7, 0x100000001}], 0x2000000, &(0x7f0000001980)=ANY=[@ANYBLOB="63726561746f723d82f9d8ff2c736d61636b66737472616e736d7574653d2c726f6f74636f6e746578743d726f6f742c666f776e65723d", @ANYRESDEC=r0, @ANYBLOB="2c6f626a5f726f6c653d067973656375726974796070703163707573657473797374656d47504c6508302c666f776e65723c42cbc559033b33f85e302fd7b605071db307c3d10df9202dd48519d9b1244328e6ca7b74952495f57131054bc7ec5141f614591a13036050fb7926bcdc11d9d2dc1e48d835fce4797571f74e75dca9b935655bf9859b43feb04c027aba7a793d6b76", @ANYRESDEC=r1, @ANYBLOB=',dont_hash,appraise,\x00']) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000001900), 0x2) 03:34:28 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0xffffa888}}}}}}}}}, 0x0) 03:34:28 executing program 4 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:28 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x400, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000380)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x20000, &(0x7f00000004c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}], [{@uid_eq={'uid', 0x3d, r3}}, {@fowner_gt={'fowner>', r4}}, {@fowner_lt={'fowner<', r5}}]}}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:34:28 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xa3, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="9bca", 0x2, 0x200}], 0x1000c00, &(0x7f00000002c0)=ANY=[@ANYBLOB='allocsize=,sunit=0x0000000000000008,uquota,swalloc,inode64,nodiscard,largeio,quota,rootcontext=user_u,fsma\x00\x00\x00\x000x000000000000288e,smackfstransmute=,dont_measure,euid<', @ANYRESDEC=r0, @ANYBLOB=',mask=MAY_EXEC,subj_type=jfs\x00,\x00']) 03:34:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'%ebug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) [ 939.626991][T13220] FAULT_INJECTION: forcing a failure. [ 939.626991][T13220] name failslab, interval 1, probability 0, space 0, times 0 [ 939.682620][T13220] CPU: 0 PID: 13220 Comm: syz-executor.4 Not tainted 5.0.0-rc8-next-20190301 #1 [ 939.691686][T13220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 939.701745][T13220] Call Trace: [ 939.705051][T13220] dump_stack+0x172/0x1f0 [ 939.709397][T13220] should_fail.cold+0xa/0x15 [ 939.714004][T13220] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 939.719826][T13220] ? __should_failslab+0x79/0x190 [ 939.724873][T13220] ? __should_failslab+0x87/0x190 [ 939.729905][T13220] __should_failslab+0x121/0x190 [ 939.734847][T13220] should_failslab+0x9/0x14 [ 939.739351][T13220] __kmalloc+0x2dc/0x740 [ 939.743600][T13220] ? sg_scsi_ioctl+0x409/0x7f0 [ 939.748370][T13220] sg_scsi_ioctl+0x409/0x7f0 [ 939.748396][T13220] sg_ioctl+0x219f/0x2a10 [ 939.748418][T13220] ? sg_new_write.isra.0+0xa70/0xa70 [ 939.748440][T13220] ? __fget+0x35a/0x550 [ 939.748461][T13220] ? sg_new_write.isra.0+0xa70/0xa70 [ 939.748480][T13220] do_vfs_ioctl+0xd6e/0x1390 [ 939.757383][T13220] ? ioctl_preallocate+0x210/0x210 [ 939.757399][T13220] ? __fget+0x381/0x550 [ 939.757420][T13220] ? ksys_dup3+0x3e0/0x3e0 [ 939.757436][T13220] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 939.757447][T13220] ? fput_many+0x12c/0x1a0 [ 939.757466][T13220] ? tomoyo_file_ioctl+0x23/0x30 [ 939.806046][T13220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 939.812296][T13220] ? security_file_ioctl+0x93/0xc0 [ 939.817424][T13220] ksys_ioctl+0xab/0xd0 [ 939.821593][T13220] __x64_sys_ioctl+0x73/0xb0 [ 939.826196][T13220] do_syscall_64+0x103/0x610 [ 939.830802][T13220] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 939.836698][T13220] RIP: 0033:0x457e29 [ 939.840597][T13220] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 939.860460][T13220] RSP: 002b:00007f0b3522bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 939.868878][T13220] RAX: ffffffffffffffda RBX: 00007f0b3522bc90 RCX: 0000000000457e29 03:34:28 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0xffffca88}}}}}}}}}, 0x0) 03:34:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) [ 939.876853][T13220] RDX: 00000000200000c0 RSI: 0000000000000001 RDI: 0000000000000004 [ 939.884830][T13220] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 939.892805][T13220] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0b3522c6d4 [ 939.900780][T13220] R13: 00000000004c1875 R14: 00000000004d3980 R15: 0000000000000005 03:34:28 executing program 4 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:28 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x40, 0x44882) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f00000000c0)={0x1, '\b'}, 0x2) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 940.016530][T13236] FAULT_INJECTION: forcing a failure. [ 940.016530][T13236] name failslab, interval 1, probability 0, space 0, times 0 [ 940.041336][T13236] CPU: 0 PID: 13236 Comm: syz-executor.4 Not tainted 5.0.0-rc8-next-20190301 #1 [ 940.050387][T13236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 940.060449][T13236] Call Trace: [ 940.063755][T13236] dump_stack+0x172/0x1f0 [ 940.068123][T13236] should_fail.cold+0xa/0x15 [ 940.072730][T13236] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 940.078549][T13236] ? ___might_sleep+0x163/0x280 [ 940.083416][T13236] __should_failslab+0x121/0x190 [ 940.088390][T13236] should_failslab+0x9/0x14 [ 940.092902][T13236] __kmalloc+0x2dc/0x740 [ 940.097157][T13236] ? __lock_acquire+0x548/0x3fb0 [ 940.102123][T13236] ? bio_alloc_bioset+0x418/0x680 [ 940.107160][T13236] bio_alloc_bioset+0x418/0x680 [ 940.112022][T13236] ? refcount_sub_and_test_checked+0x154/0x200 [ 940.118190][T13236] ? bvec_alloc+0x2f0/0x2f0 [ 940.122701][T13236] ? find_held_lock+0x35/0x130 [ 940.127494][T13236] bio_map_kern+0x49/0x1c0 [ 940.131920][T13236] blk_rq_map_kern+0x236/0x4d0 [ 940.136693][T13236] ? blk_rq_map_user+0x190/0x190 [ 940.141639][T13236] ? ns_capable_common+0x93/0x100 [ 940.146676][T13236] ? capable+0x1f/0x30 [ 940.150756][T13236] sg_scsi_ioctl+0x515/0x7f0 [ 940.155364][T13236] sg_ioctl+0x219f/0x2a10 [ 940.159709][T13236] ? sg_new_write.isra.0+0xa70/0xa70 [ 940.165008][T13236] ? __fget+0x35a/0x550 [ 940.169176][T13236] ? sg_new_write.isra.0+0xa70/0xa70 [ 940.174473][T13236] do_vfs_ioctl+0xd6e/0x1390 [ 940.179091][T13236] ? ioctl_preallocate+0x210/0x210 [ 940.184223][T13236] ? __fget+0x381/0x550 [ 940.188393][T13236] ? ksys_dup3+0x3e0/0x3e0 [ 940.192813][T13236] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 940.199055][T13236] ? fput_many+0x12c/0x1a0 [ 940.203504][T13236] ? tomoyo_file_ioctl+0x23/0x30 [ 940.208448][T13236] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 940.214695][T13236] ? security_file_ioctl+0x93/0xc0 [ 940.219814][T13236] ksys_ioctl+0xab/0xd0 [ 940.223979][T13236] __x64_sys_ioctl+0x73/0xb0 [ 940.228577][T13236] do_syscall_64+0x103/0x610 [ 940.233180][T13236] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 940.239089][T13236] RIP: 0033:0x457e29 [ 940.242997][T13236] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:34:28 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0xffffdd86}}}}}}}}}, 0x0) 03:34:28 executing program 4 (fault-call:2 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) [ 940.262605][T13236] RSP: 002b:00007f0b3522bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 940.271025][T13236] RAX: ffffffffffffffda RBX: 00007f0b3522bc90 RCX: 0000000000457e29 [ 940.279000][T13236] RDX: 00000000200000c0 RSI: 0000000000000001 RDI: 0000000000000004 [ 940.286978][T13236] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 940.294955][T13236] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0b3522c6d4 [ 940.302932][T13236] R13: 00000000004c1875 R14: 00000000004d3980 R15: 0000000000000005 03:34:29 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0xfffff000}}}}}}}}}, 0x0) 03:34:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) [ 940.425451][T13250] FAULT_INJECTION: forcing a failure. [ 940.425451][T13250] name failslab, interval 1, probability 0, space 0, times 0 [ 940.459184][T13250] CPU: 1 PID: 13250 Comm: syz-executor.4 Not tainted 5.0.0-rc8-next-20190301 #1 [ 940.468231][T13250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 940.478292][T13250] Call Trace: [ 940.481602][T13250] dump_stack+0x172/0x1f0 [ 940.485944][T13250] should_fail.cold+0xa/0x15 [ 940.490543][T13250] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 940.496360][T13250] ? ___might_sleep+0x163/0x280 [ 940.501220][T13250] __should_failslab+0x121/0x190 [ 940.506169][T13250] should_failslab+0x9/0x14 [ 940.510677][T13250] __kmalloc+0x2dc/0x740 [ 940.514930][T13250] ? __lock_acquire+0x548/0x3fb0 [ 940.519875][T13250] ? bio_alloc_bioset+0x418/0x680 [ 940.524907][T13250] bio_alloc_bioset+0x418/0x680 [ 940.529765][T13250] ? refcount_sub_and_test_checked+0x154/0x200 [ 940.535932][T13250] ? bvec_alloc+0x2f0/0x2f0 [ 940.540446][T13250] ? find_held_lock+0x35/0x130 [ 940.545225][T13250] bio_map_kern+0x49/0x1c0 [ 940.549739][T13250] blk_rq_map_kern+0x236/0x4d0 [ 940.554616][T13250] ? blk_rq_map_user+0x190/0x190 [ 940.559558][T13250] ? ns_capable_common+0x93/0x100 [ 940.564603][T13250] ? capable+0x1f/0x30 [ 940.568683][T13250] sg_scsi_ioctl+0x515/0x7f0 [ 940.573291][T13250] sg_ioctl+0x219f/0x2a10 [ 940.577637][T13250] ? sg_new_write.isra.0+0xa70/0xa70 [ 940.582933][T13250] ? __fget+0x35a/0x550 [ 940.587111][T13250] ? sg_new_write.isra.0+0xa70/0xa70 [ 940.592404][T13250] do_vfs_ioctl+0xd6e/0x1390 [ 940.597003][T13250] ? ioctl_preallocate+0x210/0x210 [ 940.602117][T13250] ? __fget+0x381/0x550 [ 940.606283][T13250] ? ksys_dup3+0x3e0/0x3e0 [ 940.610703][T13250] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 940.616943][T13250] ? fput_many+0x12c/0x1a0 [ 940.621369][T13250] ? tomoyo_file_ioctl+0x23/0x30 [ 940.626315][T13250] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 940.632559][T13250] ? security_file_ioctl+0x93/0xc0 [ 940.637685][T13250] ksys_ioctl+0xab/0xd0 [ 940.641852][T13250] __x64_sys_ioctl+0x73/0xb0 [ 940.646450][T13250] do_syscall_64+0x103/0x610 [ 940.651046][T13250] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 940.656954][T13250] RIP: 0033:0x457e29 [ 940.660861][T13250] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 940.680465][T13250] RSP: 002b:00007f0b3522bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 940.688876][T13250] RAX: ffffffffffffffda RBX: 00007f0b3522bc90 RCX: 0000000000457e29 [ 940.697126][T13250] RDX: 00000000200000c0 RSI: 0000000000000001 RDI: 0000000000000004 [ 940.705145][T13250] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 940.713132][T13250] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0b3522c6d4 03:34:29 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0xf0ffffffffffff}}}}}}}}}, 0x0) [ 940.721111][T13250] R13: 00000000004c1875 R14: 00000000004d3980 R15: 0000000000000005 03:34:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'\x8eebug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:29 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x440, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000240)=""/75, &(0x7f0000000140)=0x4b) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000200)=ANY=[@ANYBLOB="2ea80edca4f8427320069f57b91f95888c065adf14500560f89962000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000180)=0x24) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000001c0)={r1, 0x7c5, 0x1, 0x39cc4fb3}, 0x10) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) getsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000000)=0x1, &(0x7f00000000c0)=0x4) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:34:29 executing program 4 (fault-call:2 fault-nth:3): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:29 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x100000000000000}}}}}}}}}, 0x0) 03:34:29 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/v4/vs/sync_threshold\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x80000000, 0x4) 03:34:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:34:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:29 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x200000000000000}}}}}}}}}, 0x0) 03:34:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2, &(0x7f00000000c0)={0xd00}) 03:34:29 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x800000000000000}}}}}}}}}, 0x0) 03:34:29 executing program 2: syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x26b, 0x0, 0x0, 0x0) 03:34:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x3, &(0x7f00000000c0)={0xd00}) 03:34:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'d\nbug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:30 executing program 0: shmget(0x2, 0x3000, 0x9e, &(0x7f0000ffc000/0x3000)=nil) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x3, @local, 0x4c2}, 0x1c) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) 03:34:30 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x806000000000000}}}}}}}}}, 0x0) 03:34:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:30 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000100)={0x13, 0x3e, &(0x7f00000000c0)="d019c74cc6f05302b07cb87022f75e0d7f62cccca3c813c4729fd73bd6f18ee0ddd02d079403849748cf1319f8b67d3a228861bce9b0a0f36ecfa4300adf"}) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000140)={0x8, 0x80000000, 0x3, 0x401, 0x9}) 03:34:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1267, &(0x7f00000000c0)={0xd00}) 03:34:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1274, &(0x7f00000000c0)={0xd00}) 03:34:30 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0xd00000000000000}}}}}}}}}, 0x0) 03:34:30 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) 03:34:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1275, &(0x7f00000000c0)={0xd00}) 03:34:30 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x0, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x40000, 0x0) renameat(r1, &(0x7f0000000300)='./file0\x00', r2, &(0x7f0000000380)='./file0\x00') waitid(0x3, r0, &(0x7f0000000180), 0x20000000, &(0x7f0000000200)) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$NBD_SET_BLKSIZE(r3, 0xab01, 0xfffffffffffff2ad) ioctl$PPPIOCGIDLE(r3, 0x8010743f, &(0x7f00000000c0)) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) epoll_create1(0x80000) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r4) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x0) 03:34:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'d%bug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:30 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x2000000000000000}}}}}}}}}, 0x0) 03:34:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1276, &(0x7f00000000c0)={0xd00}) 03:34:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:30 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x2800000000000000}}}}}}}}}, 0x0) 03:34:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2201, &(0x7f00000000c0)={0xd00}) 03:34:30 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:34:30 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x3000000000000000}}}}}}}}}, 0x0) 03:34:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2202, &(0x7f00000000c0)={0xd00}) 03:34:30 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = dup3(r0, r0, 0x80000) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000540)='jfs\x00', &(0x7f0000000580)='em1]-\'\x00', &(0x7f00000005c0)='jfs\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='trusted\\.system\x00'], &(0x7f0000000780)=[&(0x7f00000006c0)='jfs\x00', &(0x7f0000000700)='jfs\x00', &(0x7f0000000740)='}^eth0vboxnet0md5sumem0\x00']) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x168) ioctl$TCSETSW(r1, 0x5403, &(0x7f00000007c0)={0x2eac, 0x9, 0x3, 0x7, 0x2, 0x7, 0x1f, 0x0, 0x9, 0x6, 0xffffffff, 0x9}) utimensat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x0, 0x7530}}, 0x0) sendmsg$nfc_llcp(r2, &(0x7f0000000500)={&(0x7f0000000140)={0x27, 0x0, 0x0, 0x7, 0x8, 0x7, "08c11e07054521f5bee40b5ee002db64ab2aa2f059cc6bb2e54c22bad43561e43eb26e9f56dde5ecd03b44fcac32afac41203f3bfc928bcdea0bdad000abba", 0x21}, 0x60, &(0x7f0000000380)=[{&(0x7f00000001c0)}, {&(0x7f0000000200)="2d331e3160289f270fe5a73017c8e304f6d3211b15cf74fb7e5caa42787db9db2ebae3ff5ea211e4d79395dbc97c92af5ace1357dc38fe7c21e57c7fd085a8a9f994887133289a39c3bb53b4c2a2e8690a", 0x51}, {&(0x7f0000000280)="db988fe61934eb74c08119c490e1f048f6a5b9a4c114d1d8cc6f32b4429264169f421be0f7fa05b7cc3354608b286060121990fa8024e0e675617f55da8ef5f8d84adb40637d54", 0x47}, {&(0x7f0000000300)="707d623496d8edbb8dcb25d3ce397cc2cdec4340dda3c66685c9e6e9a2226492c1e2d1829ed7fa50fee5d5732889c268a3a6b016f55c62a7dc12e22d289c96ed1529a4d992ee1ebb26c07a2a8191103979ec99dcf5ef7f38841f4d2e4418f551a8184244e3d46992e0b0bdd36b2333136c3e95fbba557023b44068d896ab41fa", 0x80}], 0x4, &(0x7f00000003c0)={0x108, 0x104, 0x7fff, "62bc8fc45bc4461034170cd32767104a640ffc89ccaec8a8981fbc1096aa966fcdb9393581fa646e61ae78fbdb73e5a5d9504b9b637d1603720956b80588625805a0ef6ff1796354548ff65a9c576d3d7284a3f683c4f8087d009d7a16f049799e3fae95518d10b2c0c188c9443c821dc58f53a4f95704efb3412008681dd5e5ec63898236519d931bc7a407c5a563be9fea240b177aa4ed3b013ddedc12ebff0862481eeaf6d75b4f4b7669d06e1bcbf687e56dbe3a34ad2d9005d48cd054c1a69ba6ff825c64c82d3d19c83142ecb6f15d4c0001581aaafd67c9bca1f4cccbc3156583547b434da5f3719826d2b2914f"}, 0x108, 0x800}, 0x40) [ 941.946395][T13352] EXT4-fs: 7 callbacks suppressed [ 941.946407][T13352] EXT4-fs (sda1): Unrecognized mount option "d%bug_want_extra_isize=0x0000000000000000" or missing value 03:34:30 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x3f00000000000000}}}}}}}}}, 0x0) 03:34:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'d\x8ebug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2203, &(0x7f00000000c0)={0xd00}) 03:34:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:30 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x4305000000000000}}}}}}}}}, 0x0) [ 942.190328][T13368] EXT4-fs (sda1): Unrecognized mount option "dŽbug_want_extra_isize=0x0000000000000000" or missing value 03:34:30 executing program 0: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:34:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2205, &(0x7f00000000c0)={0xd00}) 03:34:30 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x4800000000000000}}}}}}}}}, 0x0) 03:34:30 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0x0, 0x0, 0x0, 0x0) getgroups(0x1, &(0x7f0000001500)=[0xee00]) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x6, &(0x7f0000001440)=[{&(0x7f0000000100)="2532b32a38434135be7163ed93a38a97", 0x10}, {&(0x7f0000000140)="191b47f5f2566d99fb3c53b8d237a3850f55098cd3735fadd4b754d0e32573cee1ebc0f4f4d8aabffb046b661fa5d5d3ff60066af8725695f74ef0a7e7f93f796a47e364b8a02bf81e5c050c3bd2205e6f6d06f23f8e08e357c657b7612268f6bdfeaaf1f911d8c15294606048b68fe4bc917abfcac742427a51570478e30119fb706fa1c594c3326b3a8282596952f353772f5ee4373471a468882c03db3bc5de16552104d68e84f40eeb95dd6dc6766c9675801b1da03517e8c02d05a19d46b25cba29f8330e1f4fb7e27bd10836bac517f8f6321fad", 0xd7, 0x5}, {&(0x7f0000000240)="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", 0x1000, 0x3}, {&(0x7f0000001240)="2091e95e6a88d845b811e16e5abf62bcb778770afdad2d7aff8d29c67058615891b6f801d5c6b03a0fb5d690dfed9a5ef0ac765f59c172937255d214b876687fc6f4eb5abc2dc7c7b92872db710454d485d68bba6adccf99438fe93725b01df82bdf88aa32887bb69d4142b2ac4e9f3f6d26b9496f98f3596a15be1ea21441cae0e96cbefd499d", 0x87}, {&(0x7f0000001300)="1ec05a1dc604f96d987839f6e0b8daa4724d40e38c6752ae211421e9402af88f4ae49050689a34eedab6cb2c4d983fba", 0x30, 0x8}, {&(0x7f0000001340)="27d3547d31295a9a81e519ef0514febeaa2538da3ac0073c4493b8ca55e09b551c14440c91ba8de72011ccd6ec24c6d5813aeae5f6aefebbb1e69ce381ce71f4ad5ceb67d5eda4c2b06566a3026df8cb472bcfc5601dcab524e5b48794babef9647c4f3c264016379c904d51b87bd481292a6865d18ad1d134798549f4a78d89c7fc1127bd96b7e73dcac6fa82cdbaf6a24d63d0fe0a76dbc0026596143f8d273c6c0fd12e0c3d5b9bd3090b3a5f99be37142d5665f3ab9bc4a4a51652033f7a11971b3db407bb7d70bde38cc0883c56fbb4bf4f417b890d4569532d4b", 0xdd, 0x5}], 0x10, &(0x7f0000001540)={[{@nls={'nls', 0x3d, 'koi8-u'}}, {@disable_sparse_yes='disable_sparse=yes'}, {@fmask={'fmask', 0x3d, 0x5}}, {@gid={'gid', 0x3d, r0}}], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) 03:34:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:31 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x6000000000000000}}}}}}}}}, 0x0) [ 942.387070][T13383] EXT4-fs (sda1): Unrecognized mount option "dŽbug_want_extra_isize=0x0000000000000000" or missing value 03:34:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2270, &(0x7f00000000c0)={0xd00}) 03:34:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'de\nug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2271, &(0x7f00000000c0)={0xd00}) 03:34:31 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x800e000000000000}}}}}}}}}, 0x0) 03:34:31 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x3, 0x320, 0x0, 0x0, 0x0) 03:34:31 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x8035000000000000}}}}}}}}}, 0x0) [ 942.745776][T13409] ntfs: (device loop2): parse_options(): Unrecognized mount option mask. [ 942.757436][T13411] EXT4-fs (sda1): Unrecognized mount option "de [ 942.757436][T13411] ug_want_extra_isize=0x0000000000000000" or missing value [ 942.771476][T13409] ntfs: (device loop2): parse_options(): Unrecognized mount option rootcontext. 03:34:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2272, &(0x7f00000000c0)={0xd00}) 03:34:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) [ 942.793908][T13409] ntfs: (device loop2): parse_options(): Unrecognized mount option audit. [ 942.828782][T13409] ntfs: (device loop2): parse_options(): Unrecognized mount option appraise_type. [ 942.848571][T13409] ntfs: (device loop2): parse_options(): Unrecognized mount option hash. [ 942.891354][T13409] ntfs: (device loop2): parse_options(): Unrecognized mount option . [ 942.900888][T13423] EXT4-fs (sda1): Unrecognized mount option "de [ 942.900888][T13423] ug_want_extra_isize=0x0000000000000000" or missing value 03:34:31 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x4000, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.opaque\x00', &(0x7f00000001c0)=""/52, 0x34) 03:34:31 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xfffffffffffffff8, 0x4000) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f00000000c0)=0x2) 03:34:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2275, &(0x7f00000000c0)={0xd00}) 03:34:31 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x8100000000000000}}}}}}}}}, 0x0) 03:34:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'de%ug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:31 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x86ddffff00000000}}}}}}}}}, 0x0) 03:34:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2276, &(0x7f00000000c0)={0xd00}) 03:34:31 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x8847000000000000}}}}}}}}}, 0x0) 03:34:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2279, &(0x7f00000000c0)={0xd00}) 03:34:31 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x8848000000000000}}}}}}}}}, 0x0) 03:34:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227a, &(0x7f00000000c0)={0xd00}) [ 943.262303][T13448] EXT4-fs (sda1): Unrecognized mount option "de%ug_want_extra_isize=0x0000000000000000" or missing value 03:34:32 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x400, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000300)={{}, {0x1, 0x2}, [{0x2, 0x4, r1}, {0x2, 0x0, r1}, {0x2, 0x5, r1}, {0x2, 0x1, r1}, {0x2, 0x2, r1}, {0x2, 0x6, r1}, {0x2, 0x1, r1}, {0x2, 0x1, r1}, {0x2, 0x4, r1}, {0x2, 0x2, r1}], {}, [{0x8, 0x7, r2}, {0x8, 0x2, r2}, {0x8, 0x2, r2}, {0x8, 0x1, r2}, {0x8, 0x5, r2}, {0x8, 0x4, r2}], {0x10, 0x7}, {0x20, 0x1}}, 0xa4, 0x3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000140)=0xfffffffffffffffd, 0x8) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r3) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f00000000c0)=""/109) 03:34:32 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000100)=0xfffffffffffffffc, 0x1) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000040)) sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2080}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010825bd6dff1dfaeb7000fbdbdf25060000000c170300080003000000000008007300ffffff7f08000600dc0000001c000200080007000000000008000500090000000800030006000000080004000900000008000500ff070000959491fc7837c7e56ae216248dc654f2a089e4a8e4a39386878911475b7a69e83515f2c4d7d4fb33b8701cba89bf0ccaeb0aca7cd89eab0a984d8175d746bbabaf2efae5027a1ed187450bb577c34778507f"], 0x5c}}, 0x0) 03:34:32 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x8864000000000000}}}}}}}}}, 0x0) 03:34:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227b, &(0x7f00000000c0)={0xd00}) [ 943.543325][T13466] EXT4-fs (sda1): Unrecognized mount option "de%ug_want_extra_isize=0x0000000000000000" or missing value 03:34:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'de\x8eug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, 0x0) 03:34:32 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x80000, 0xffffffffffffff5c, 0x0, 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x1, 0x20480) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f00000001c0)={0x10204, 0x0, &(0x7f0000ffa000/0x3000)=nil}) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x400200) getpeername$unix(r1, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) 03:34:32 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x88a8ffff00000000}}}}}}}}}, 0x0) 03:34:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227c, &(0x7f00000000c0)={0xd00}) 03:34:32 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x19) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="b1", 0x1}], 0x1}, 0x8000) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="d0", 0x1}], 0x1}, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:34:32 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x88caffff00000000}}}}}}}}}, 0x0) [ 943.751690][T13483] EXT4-fs (sda1): re-mounted. Opts: 03:34:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227d, &(0x7f00000000c0)={0xd00}) 03:34:32 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) ioctl$NBD_DISCONNECT(r0, 0xab08) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f00000000c0)={0x0, 0x4}) 03:34:32 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x8906000000000000}}}}}}}}}, 0x0) 03:34:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227e, &(0x7f00000000c0)={0xd00}) [ 943.849625][T13496] EXT4-fs (sda1): Unrecognized mount option "deŽug_want_extra_isize=0x0000000000000000" or missing value 03:34:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, 0x0) [ 944.042872][T13511] EXT4-fs (sda1): Unrecognized mount option "deŽug_want_extra_isize=0x0000000000000000" or missing value 03:34:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'deb\ng_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227f, &(0x7f00000000c0)={0xd00}) 03:34:32 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffff000}}}}}}}}}, 0x0) 03:34:32 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x3, &(0x7f0000000380)=[{&(0x7f0000000100)="b1fb126dd021b1aab5a03e6210964b97ddc350627fd2da315a3dabc58f02b22afea99f3959d731321a62314c79848303063f7c221d8d54a4a86b46a71caa8cbcf80e1ea2de83e2c920db2ddaf18fdc2dfb9fa5ebdd5e3fa5a5140735ab9edfabf9799b90898d24ad2c7e0afbb417636773d338ee6b7f00894d68c6b4024dc440e8defdea99707f6cef660418c89231e81ec8aa4df3869ddfb6912d665fc1b2c9706acf31b110bd675a567bf6af95c362deaf39543252807547e40cbbc3d73b49e11e1ba9541feb3602cb", 0xca, 0xffffffffffffffff}, {&(0x7f0000000200)="8b325143fe1d1aeeee8a35292e1da2d153be6c693b08816f83102d87f3ec37eb5b1e0fae3f15ee74703ba24b58c8ab9a3bf9f194560e54edbcff7819d4bc098b35bfe1402d0d3b16a658f6bbbbd9ff69b3bb84ba4871c0f19c3123460f7161e37a705770276e9ccfc98c53a5514a804343dab00e86df7d23c9b8ef478384548a08c01f7a0db8e34ec404cc4c9018", 0x8e, 0x8}, {&(0x7f00000002c0)="458af1b0d675e1931e18f896957b4ead644c1bd03640be1ca87d47595b98691f1f81976df38cab9889417e728fe712a7475159481b3d565886dbbf518ff6d82a31653d1b3eaebb3b1bb2a67fc1f589e5b99b12c698b13854d02cc9ba03d00af12b7fe0328d309b1ef7f4904c158e579a09088a10ddea89de693f580e2ec617c60db2cee163e54f973aba5da81227c340a1820a2e", 0x94, 0x4}], 0x0, &(0x7f0000000400)={[{@resize='resize'}, {@nodiscard='nodiscard'}], [{@dont_appraise='dont_appraise'}]}) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440)='/dev/snapshot\x00', 0x402740, 0x0) syz_mount_image$gfs2(&(0x7f0000000500)='gfs2\x00', &(0x7f0000000540)='./file0\x00', 0x6, 0x3, &(0x7f0000001700)=[{&(0x7f0000000580)="80aa2fee357dd0456c73c6dc8d6635954d36084f19371138a50d7ab015a0c7a365b82582d1943e94469435dbf5dc07d6f27be6860ec3896f0da2d96f1b72fd31eaa602b563f77c9edf344124971807a4898e5923e52b9bf7fd01dd1c28de2bb82aa051da35c846fb07483e063d33df9b1656b0ee5e7ca47ce2818fd002479b799f7f18aa0489a4d304b9591e0f2a0e0fc651acd91dfae580212d8ac2bab9744a15453eb5c2ab8aaf8a8e41cd1e4f527e4d29dd42597b5359eba166645e631bc0b426d81910de60d9ff7aa78f56f2e2d68f21bee80ac460e01f67da86e9996e7442288960951b1e97900abbef0c0e42662cd419856fcc8ceb54812ed1209dbc1aa12140cb2081be16e68301853b32992cd470249e827b08c1f543e8a86fab7f2e2be3b257fc7d832c08db4e38ccbe1d0ffcc0508ea2f016d6013a20e0737f1e85498162f82d5515e3b728e030c8a24dbc83799cdae0945cbab91ee2fd60b3caae244a84e3089ec6aebe96b21670f80bf4732e715ccb6148262d9579da24342770e82ce5088868852e8cc06b18af6b86f388ce463071113c72b5679fa8b649e46bb7d979701abe7cf0aea892060ec4abc0699dfa91b5d8a6172ab8902bcc9c4a00d91c9c22e40a8ca0d6a082e6f6497668871c2c45a3f5f48ffcf45bb4fb94657517fe03b04b1b627c3d5a2ea7c3485295a449aa1ffcd035713712d14296f0207252d9d78684dbfb2eda9e0bd4e3551c23117a0311efe3dbe0c7ba1e1a68a90eff660232783e72fe3e78351d10b5017336601b5160d9c4440194529613faefa6167874aa3d9d697bdf158bd7394803187ea69a942bd4f6779518f1d4fab41cc8ce67b267d258b0d9c92d80fb7064964918e42d9a9d1a19d66cbb3846c7b6389b70ad98b142f00af58fbb63706fb62b0b19ebcfb3f4cc12d792d16630878bac9d71998a83a927eeb01ba6f68c37c1beee6efa11fc5e9bb5b67af18cc4bbe5397dd561ba78305afbd3ad6069bece5eac3861578a0afb9f88866f226571842d91c315e8a0c731cf47c8f84955136ade0aa42bc7c4d821ab319c83aac71ce961389367dae3fe6cca8680bf0078e0f091e96e6d9b2f1b3102d834e7d041026937ff15d149ea9313ef4fbcda5b6e49750c4b809e2025ea3d3c9f531da552bc06a92376b65ee97ce67bf85cd40c4f41a3223c55d3eb92f91a0a2955d060435cf8d6041dba9fe765b4ac930d5e191a760f2c4d489d3e8c51ea4d6071cf0d16296b1ce3c474fc9785961b9d45de480a711385d3479831fd27533307e0f7c9dc44e3efd4b1549b4dc7e04ae1f68fbbb296f829d86920ea3665633e84a8693989f4edeb8c6c13b97ef504fd62637411a3a235b4f12ef004d2164491a2220142d943e303861c218d3c92926324b7132f8e7e21f0b4854be32ed038430bba7d60e9fecab4c3755c044034f2df28214b2b3dce2aad0cf8fc05d575b445709dab7791a4ad8cdce948893852ff3b8e790b885228f9b3ae679cee762f3608e4deb8cfb622450972c1979d24d636599f1c9077d3fa804efcb91bff090978b7b06993e7dd92d79442afa8acc2187ef50657306e6b18404df3282f34a3f854988773d4183835dfb93b4cafa07004905d4c9ee9052a26de6c8f1924904df75e5b609fda30de1d6c022ceac00cdb3bc4bdafe6f582a1158ce6085358ee2f789cd7c2770e808fac4a15f2a6d1d35208bd13184ed6ea34f9588334a45140531b0f1ed3cf1fad586b586e5061db88b515074e8731dd64b249f90f0e9f07f040315ea43bb78979601509ce8d251fd667d8f827f3266074ed20bf88a331706e019ed0a796a313d7f0f8b4642be25ab77e06cfaf191dfd14365f0359c43d41d29334f288c2fd9b71fad7558b76c3503cb5a7fe7ed1dc280ee321014fad9d885b75458168f522c65894bd5bb8e26493fefe76d3ff38706a0cc8cd23c103af4ad7c8f31b572aed287171d5503f62c47119c7b7e7a35462cf4362ad412a39d96dd48aad412fb06a433cc230cf02e346780e0c347356b835ab29728240a858ffd55206f645ed127f4639df99ec9104c2f33f53e4252fe4209029f69fd9985d8fe55d243d561d85e85cec139f153b47a9a0e8c5e937ad63b217291e6bf12cb5e893d9af08480e2f7efbbaa89539cec0623b54b8217b409aca723b0f593fe237ae10553bca177ccf5d60ea69da0c4cf5b7eaee63069b330b0ab4b67925ada5921be62ccec29872d21a60d7571a638975e6cb7d6526981740d52d29ef1bc80a10c2a77f0deeea09384f3d110dadd6c5c50aa2c8906725aa8a404e0326be6a68b1df696973b2bb449de3e8fcb1755affaa4b39832ac82fa9d035757a996b88fea7ffb2e748fec0cb820c328666a7b6b4ecd07691aac106e04b41e21736427fcbbbfe45811785eb24c04c1c89bc4916825800ac976b84eb4b4542eeb2521fe7dfb933f69737a77cada2b938c85ed65814e50c2f5561b49aa3bc6fed8612f10ca5556c39eedf2445974c3ee3f6478a6d1e1676f56f1473c6f7f525019cd0357b412218506bcd54f93db7a94b01e85a6e31880881635ef8de2fcba54794e3c15d41f046f73d0a72246f022ab70c22d294fd066ea49b41d5101fa4b07f1221512971297dd60cafc3cbd3cec94e8d3ff9e9563030980e570615de2f99c42a32cc3679f73578a467610fbb4d9d173ffcda23964b0b96e7704362d5619bf71f5cb4ce1f3deb1ecdb81c50f1a76ba76f52eff6ffc2f73c688f467d91a8ab1b16a768f76452742cebd72b2afc03129976d492fb622f4ffc43f7ea8423942b59e557df0a1932a3d8758b86db16386db45f87a25e4aa42b4cbe4e1f4bd10f72fc9b75a00191ed52e1ba03a2e34b0d00abafb7e2f4efebce7a4522537afecdf86855788733c61eebc8fb655a61d8763b5fe036bcc77f031557a350f283de5d48d242a0c1f2ccc06e65a5a0b516641827915a34f9fda5ea912fbd27412087221954d67813ff4ae69a4854a48ae4409e9f6a28a75a1fead365d18e2e2a04659e41055ee67edb20044086d4d96e83e53b90832d053e192b30e223dbaa03941bc602549165a97fb6b2313864aa08b634f0c1724f39bf3e4405086983f4503391c7d495968a1afa07c26a764a567a50b5e1e6bc28c47e2dbc6ff53cbd53fcd6b43c5215bf343ffbac4199b970f6b32e21077c270a5ab1dfb5656c26023dba2fac4caee74eca10a1054a571395bc0eeacedd42f863422c54ed6264e48b7b0a832f8cef18e2f237adb0ed315091ca0d773b4ae982249f8f0a8bc6ca83338051a5a61b65edb1ff1e9c81b3faac8e4bcd9f269796103118f9d6d8d9f0c3c7593a59d3d305aea44c419e5211237f0fe16dd96dc6050f9c60e63115c0db095cc86a81d9659f3c3a5e239c410224d09ee22768bc0fe942eeb955b0642986a3e5cdb89e4e8b832567ee63800a72281f2e4ece7296467d0f7764f9a6862557cd793aba285ae46fd494a0633068c1db141847bf23025b1661d49074702a375b79ce506c58804ea511eef5faf724f1e799a31e62b824525491129a58d646b8d78129b3588990bdfe9b83bf28d01ca18439de1e8eacd617f31d3a3dc11063fd86bfa3dc39a09379f958a0cb3991a6618f4fbbb7a60686412565ec74ed99dd00ea75487c4f310b66a4ced904aaa83d2e9e400eb95c67de13d0c575535e6840ad00b8fbad969eaf98943186d1198ac42abaaac7693d8566d37eb5668641308a208b69a2625c6ca6652e5b882494ac4f0188d76eb62943f815c48072f626a39f575ac820916506c604e22be3b0ab2271d28f2b449ae31db6761ddd5960eb086a9ba1e647706e5695b09a53878a63438c206dab72031ffbc6fa4f987ceebf4d04cd936942434b24c243607448536b95746bbd2f523dd3529410d2d3162d0e26280615c243a7b37d7e26a7e5f6bb190e8878f03c2b326a8d7952304dd543fe6dd5250b082d2f521f73abad8aa85438c8d3cd73d1161d2cef817a35211c1ef8f6009b9e4ca2b88d5a43d857e49a2c709adb77ba5a6bfbab7038878daf298ae3600ea955a17dc9e908b48cfb1e8f86f463b397c195750998657cf190f774b32607ed280f4526d1ec6c1256eb61a79e34f11ebb711d33afd997b690e852fa172f20731a85bc57bf5cd05f5d03767f9093a8569a04e913ed308c9e5c151344dc8684fb619656857ef4b7f0bc24c12a9afe3e1a8e1bb0c7b549db1c9ac037b46dbc7903682ac974dc85f961663689f69f8b014f299d324c6aab0734ab864f2d9e03cfbefb0fa2fc0bdc21dd173539c17aae189951264311121a4ac4fc351e4af062a033df466a77e65ac471e926c4ee3874672eb139244fec52547a8a0c811a1dc462002e4741218376ad3e278b241617161de7e735426b0571b1ad976a697ef302b752b3f9e40ec4843c2d3723116e525b000193e334bf0b76c020a7aa355c5196586039576471afa92cde754a30c2ae44cc687c78cbfdccd873ae37bcd8d6953811f20830b99982e0e4fd5b5fc156a5c06c4f115a9476b4273be32f2278c9ddf9d3555752ff97aa8cdf24328e9be55d674bafb60c5dc0c2045a8a6f718b476bcb895fa5f7bd122321f0414bf6485c49190c7b8c3f98809d207e0f25e6a8801d432a59aaf1bec3b270710b16d769ffd9c074a24e26533de0289298faf58f99ad8318b43a376eb37f68affa5f50bda8ae33efc0a08bb86d97e121bfc181a2b3ad867934c11a7c679b111598dbfe55d585b239cebe5d9a7ff4d50bbd10faa252253e3e23fdaa79e91e83f0d8547d612598018b2f42ef25167851fe8e5d84f9546dbf30250d9b1063122bea6bcd315389941a6926d40b6d819e9f2ba61497674fbba4456807c81b848a271b4c051b5705462f1389ac639cb445f3196c8b0a884c3a05cf15a4b2d85d5fbddbc7df4eb2ffbe41ac6b16ecc8092f0f08d1b52a034f0b645474befc332fad2f16b176d019297b5dea44d0c32b6debbbd881299ef1608b698d2700499758dd6e7fdb129b663913c59ac55e9305acf43e0ece212a1b45865dbbd638a4acd23297194fbcbb1f2a98ec9da7d0ebff23fd5b854aba96052a65273757ea6aff95f3914288f64b78423eafd5a2d2f367e713a346c01e2a2cf3d8557134de615aa55b16b222f34abc1c003dd7904a40bc8b036947ec0d72c8518838356a76ac670b713dc3e7b5227331c8d4ede15f31eafdb667a674784f4b704ef71a986d162cf1f84bdd523139ad7f65d88c2d9d493421f53cd5b3b66f9a4a08fd82c68290726039812150909d79daa83b0762f8d872e4d41fdd837215aa049616a2e6c37b5e78b35ced7d1ce6edb193d7cdd0ec89f9000820dd4e6e4fa6af618d4ff375895dad4ed0b933e0ebf59620f7b89e8194bf4c801852affe8b654432e71bf1185d2aaf38d462415dbc0f79add20d72e296646fd78d2288c147028af6214b439e8dfd2245ed9cd04003f24e4471a3c49783eb9db671a0686f9fcb95856909809491b7195885af5d98872a06b44df7bf5b329e3bceedaeac1882e3699f19f112c7b8f43bf4b263a63dcb1b768477f9d6f52f1affed92fd846958d521b74109affcdc99860fcbff8173cd24d12387c6d8f6079521c60309ee4dd38bd2bda4fc89d7163253a4e51429301795334c932dc5b6a7a7eab2380f7fd589f1e699d96115fd093c840fbe8aabb4c59f3f1eff3c76f131fcfd17df0302148435a856d940d499080d8427236de269c555eddf7516fc56123ea2a1673c453e69382f9cef0d5d515af2", 0x1000, 0xfffffffffffffff7}, {&(0x7f0000001580)="2386de5332dde0675abe40a5186b600b1bde0146cb6e16c5129eee3e9959db717ee7e0661b06cafbe9de1e6ec66e31637eb7d198a30d2fdcc80b364db204d6d8df5b202e6713993dab576654d087b3cdb064702430640705d1d2e73d6b6737ac7c553cc0c2fdc6dcf19679fc1e3d42f5809ebccfe440f4c50e90301af3cfe19a14d08de4dba364c3ad29", 0x8a, 0x100000001}, {&(0x7f0000001640)="bca43950adf0387826fc3809f08c10953446c994a236bcecd2229cf8681d6c81fda3711eb31828751fc5a148bababb87bac146e807f2ecb53203fa0036ed363898aa8c1e22f449f431343bc2039a80e206de1ecd2903c0fcd72352040f5deb613b998dc9737823c2b7cce2b743e06ba4510535c43ec63fe7de5247a8b5203a28c516ad3c581bb6acbec2fe59129ff3abd133556816", 0x95, 0x4}], 0x80000, &(0x7f0000001780)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@spectator='spectator'}, {@noquota='noquota'}, {@acl='acl'}, {@commit={'commit'}}, {@ignore_local_fs='ignore_local_fs'}, {@quota_account='quota=account'}, {@errors_withdraw='errors=withdraw'}, {@data_writeback='data=writeback'}], [{@seclabel='seclabel'}, {@smackfsdef={'smackfsdef', 0x3d, 'trusted'}}]}) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1b, &(0x7f0000000480)="3e7392406fe2f263119d1c5c3ac7cd3c5fb9262f0682959b3b19539f82c687a7e4112fecad036dff6b2fa2ee4a8aa612347f66f7d8e2d024c25921b0d49a18e36ddb653a2dc253a0ef8235b640d9270c91c8b732f06dad81c7c67e6749bac4c122e8f96977e9ec0ec78bc83e", 0x6c) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:34:32 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}}}}}}}}}, 0x0) 03:34:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2282, &(0x7f00000000c0)={0xd00}) 03:34:32 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, 0x0) 03:34:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, 0x0) [ 944.295068][T13519] jfs: Unrecognized mount option "dont_appraise" or missing value 03:34:33 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8}}}}}}}}}, 0x0) 03:34:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2283, &(0x7f00000000c0)={0xd00}) 03:34:33 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0xd}}}}}}}}}, 0x0) 03:34:33 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x3f, 0x0, 0x0, 0x0, 0x0) [ 944.452714][T13519] jfs: Unrecognized mount option "dont_appraise" or missing value 03:34:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'deb#g_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2284, &(0x7f00000000c0)={0xd00}) 03:34:33 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x28}}}}}}}}}, 0x0) 03:34:33 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@remote, @multicast2, 0x1, 0x8, [@broadcast, @dev={0xac, 0x14, 0x14, 0x1b}, @rand_addr=0x5, @dev={0xac, 0x14, 0x14, 0x24}, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x7, @multicast1]}, 0x30) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f00000000c0)={&(0x7f0000ffa000/0x4000)=nil, 0x80, 0x4, 0x80, &(0x7f0000ffd000/0x3000)=nil, 0x6}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000100)={0x40, 0x1, 0x0, 0x3, 0xfffffffffffffffc, 0x3, 0x2, 0x40, 0x8, 0x0, 0x1}, 0xb) 03:34:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}, {@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 03:34:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2285, &(0x7f00000000c0)={0xd00}) 03:34:33 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x30}}}}}}}}}, 0x0) 03:34:33 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x4, 0x400000) ioctl$VIDIOC_ENCODER_CMD(r0, 0xc028564d, &(0x7f00000000c0)={0x1, 0x1, [0x80000000, 0x54, 0x20, 0x200, 0x10000, 0x5, 0x2, 0x1]}) 03:34:33 executing program 0: mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fusectl\x00', 0x104000, &(0x7f0000000140)='jfs\x00') syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:34:33 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x48}}}}}}}}}, 0x0) 03:34:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2286, &(0x7f00000000c0)={0xd00}) 03:34:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'deb%g_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2287, &(0x7f00000000c0)={0xd00}) 03:34:33 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x60}}}}}}}}}, 0x0) 03:34:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2288, &(0x7f00000000c0)={0xd00}) 03:34:33 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0xf0}}}}}}}}}, 0x0) 03:34:33 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x40000000, 0x0) 03:34:33 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f00000000c0)={0x2, 0x5, 0xfc3, 0xbe2}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000600)) 03:34:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2289, &(0x7f00000000c0)={0xd00}) 03:34:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)) 03:34:33 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x543}}}}}}}}}, 0x0) 03:34:33 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x608}}}}}}}}}, 0x0) 03:34:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5382, &(0x7f00000000c0)={0xd00}) 03:34:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'deb*g_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:34 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x689}}}}}}}}}, 0x0) 03:34:34 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000100)={0x3, 0xfffffffffffffd09}) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x802) accept4$netrom(r0, 0x0, &(0x7f0000000140), 0x80000) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f00000000c0)={&(0x7f0000ffb000/0x3000)=nil, 0xaa7, 0x3, 0x1, &(0x7f0000ffc000/0x1000)=nil, 0x66d6}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000180)={0xb38}, 0x1) 03:34:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5385, &(0x7f00000000c0)={0xd00}) 03:34:34 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x806}}}}}}}}}, 0x0) 03:34:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)) 03:34:34 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_getres(0x4, &(0x7f0000000100)) 03:34:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5386, &(0x7f00000000c0)={0xd00}) 03:34:34 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0xd00}}}}}}}}}, 0x0) 03:34:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5421, &(0x7f00000000c0)={0xd00}) 03:34:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)) 03:34:34 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0xe80}}}}}}}}}, 0x0) 03:34:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'deb+g_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:34 executing program 0: syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f00000000c0)='./file0\x00', 0x5d, 0x4, &(0x7f0000000380)=[{&(0x7f0000000100), 0x0, 0x1ffe0000000}, {&(0x7f0000000140)="644a99e8989aaed2c518c96ab88b3a00e0a0d91b618e986d4a09e345921df9ef31a14adf5e1277611d4f1b88f954a65773c335729787ddbabbf8c200a304a4ddeebc9810f54cdc9ad0f8e3d5108e5964748d003716643503b8cd8e944ed41d0bb8212bd46a9e83642ceeea964ace824a7f119e386466ad3ac8c3b0ab819bd9ca83bcc0f3615c29dc69c3bf48fccafe08c5880286b2f22c6d9713d68bb2e9c8c9af31552b80474fb475", 0xa9, 0x4}, {&(0x7f0000000200)="4efc92b933590e91084977cb64f7f5e156e062eaa2959e5f929cab1c360924b87ca51e5b13a1d5fa971821087a76424951f2055f5a2086902b3935d205ee0a7cc876158296b90753d41a06f738cf36694cc714a0acfe8e995a236100e31e2a4f2acbb3c57a141adf6b4fab64e1d909130e580d34997dc170206eaebaeb086818434878236bdaf15f865ccf37fa88faa8ff6fc2f3422e70fd4dcbe57a7090990a35e190242e96f7019459165b3e838a1e9b2c2be0a62d22", 0xb7, 0x7}, {&(0x7f00000002c0)="491a1c47d34d145296d647abf7b12c0b0dffb65d06ef59324f8361d0fe98e3dd8bf2f075fdf5a7860d5c1ef61893e6d984cbc1149775cf0077f6002a2bbd7385093f686679ff65f0410963492e056f8db2d937b937f5a5714baef0afbbb5b9cd40181581ce46f0bb47953c235495b09b7da7853f1a4948995996897b15ea961b605df2411a32f761d7ab633f4cce85116ad3b91994a15dac85a4e19ff42be1e3523a26d2f1608574", 0xa8, 0x401}], 0x8, &(0x7f0000000400)='jfs\x00') syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0xfffffffffffffe15, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000700)={&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000480)=""/164, 0xa4}, {&(0x7f0000000540)=""/162, 0xa2}, {&(0x7f0000000600)=""/87, 0x57}], 0x3, &(0x7f00000006c0)}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000006c0)=[@in={0x2, 0x4e24, @multicast1}], 0x10) openat$dir(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x40, 0x2) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000800), &(0x7f0000000780)=0x31c) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000740)="21403ef859c14caed904032fc38ebf7a919091c261943be49ee9556df84de079d4f2d831ead6f29b5c") 03:34:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5450, &(0x7f00000000c0)={0xd00}) 03:34:34 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2000}}}}}}}}}, 0x0) 03:34:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5451, &(0x7f00000000c0)={0xd00}) 03:34:34 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2800}}}}}}}}}, 0x0) 03:34:34 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0xfffffffffffffe6f, 0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001140)={0xffffffffffffff9c, 0x10, &(0x7f0000001100)={&(0x7f00000010c0)=""/3, 0x3, 0x0}}, 0x10) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000004780)={0x8, &(0x7f0000001280)=""/31, &(0x7f00000046c0)=[{0xfffffffffffffffb, 0x1000, 0x8000, &(0x7f00000012c0)=""/4096}, {0x7ff, 0xf6, 0x1, &(0x7f00000022c0)=""/246}, {0x0, 0xb5, 0xfe7, &(0x7f00000023c0)=""/181}, {0xffffffffffff7fff, 0x27, 0x1ff, &(0x7f0000002480)=""/39}, {0x4, 0xc9, 0x6, &(0x7f00000024c0)=""/201}, {0x1000, 0x1000, 0x80000000, &(0x7f00000025c0)=""/4096}, {0x80, 0x1000, 0x9, &(0x7f00000035c0)=""/4096}, {0x2d881038, 0xee, 0x9, &(0x7f00000045c0)=""/238}]}) connect$bt_rfcomm(r0, &(0x7f0000001200)={0x1f, {0x101, 0x8000, 0x400, 0x1, 0x0, 0x6}, 0x6}, 0xa) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000011c0)={r0, 0x10, &(0x7f0000001180)={&(0x7f00000000c0)=""/4096, 0x1000, r1}}, 0x10) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000001240)={@empty, @multicast2}, 0x8) 03:34:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}]}) 03:34:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5452, &(0x7f00000000c0)={0xd00}) 03:34:34 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3000}}}}}}}}}, 0x0) 03:34:34 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000140)={0x11, 0x7, 0x1, {{0x4, 'jfs\x00'}, 0xfffffffffffffeff}}, 0x11) epoll_pwait(r0, &(0x7f00000000c0)=[{}, {}, {}], 0x3, 0xfffffffffffffffe, &(0x7f0000000180)={0x6}, 0x20c) 03:34:34 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:34:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'deb-g_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5460, &(0x7f00000000c0)={0xd00}) 03:34:34 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3580}}}}}}}}}, 0x0) 03:34:34 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3f00}}}}}}}}}, 0x0) 03:34:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xb500, &(0x7f00000000c0)={0xd00}) 03:34:34 executing program 0: syz_mount_image$nfs(&(0x7f0000000000)='nfs\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000, 0x6, &(0x7f0000000480)=[{&(0x7f0000000100)="d41c1227b80b0bca072da0298245", 0xe, 0x10000}, {&(0x7f0000000140)="e7dc", 0x2, 0x400}, {&(0x7f0000000180)="d40dc5c2a5a7ef8c93c3cda9e10a2fb0bcdbd8d98f383378dbc3338a910c52eb3a10f49a2e79007b62ef85df12cce83439d7619e41323592f05c3fadb4893985b4366b5d0aadac5ed92584a2f3dcfb253e8d613c2523dbabae0934e14f3734bf9c19efff0c85e2f28f8ff1c64bcdabd60ee56f383e1adc868939d2ca1cb5b076b6a6718e512ae47a6557c7fd95cdb36a071bd51d7a4cde9f4d760947d28bbb4f7997c33a1c00b904007107417839461a2e3da90d242563efda2ae9d0", 0xbc, 0x7fffffff}, {&(0x7f0000000240)="636e7b69e6759d5b0ff2269cd914d0a946ec80f0acc28c8626b16c626bcf1db45e7a202cd0e31eddab9478feb21be3edee1c4154731ae2cb52db0dd6ae0c84cd2d1192011c2cff4e5c03c17fdebddba25ac1a4e1c32d85e4500b78c91722f91b86270cdfd92c88575b4a5f9d4ee3f06bf1ce62e807212482bb0b3f7056f62a50bf6d33e6bf26686d91f2f79f12fa3a438231171e4e6d12113277684f5d31920785bb566615306642dbebe8e5ff4ce005dee863b57a5f8f3d82bab75132b711d5c6d5573512c0c50ca0d68eccb8729bb09169ddd426a476d79ad1e32e96da50af0b", 0xe1, 0x1000}, {&(0x7f0000000340)="2947c6773c0f0ed8ebefd763a39dcbe65b8bce98e65eb8be26c4b09f1874c7e6ed120b5f1e349006b0abf2ac43d9cf17e2d0fce0dba4092bfc1038195d06cd3cfe0197184125df2632f077a2ab1949e92266561d7406c3b3c65cdd30add7f026ad8514dfd474a111b8ee5430a298de6e61c065f1e767c4582c4c3c52f25fa55036fb19466f0968f9dd5b5c582a972b785d87555aeeba721e6f8b6a4dffc0b3fea5b90d74f8112d8cd2fcee536aa5484ec70565d49fe1330fc5dbebf84e1d40e233432736c1cb3bfd971a9aa0c27395c726f9da9a7a5a05594b533b5a725c26b7", 0xe0, 0x5}, {&(0x7f0000000440)="58c6b375c0744f46258bc5", 0xb, 0x6}], 0x800, &(0x7f0000000540)='bdev-#\x00') r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dsp\x00', 0xa0080, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000640)={0x10201, 0x1, 0x4, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f00000005c0)={0x2, 0x1f, 0x4, 0x8, 0x7, 0xfffffffffffffffe}) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f00000006c0)=0x7fffffe) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000700)={{{@in=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000680)=0xe8) getgroups(0x9, &(0x7f0000000800)=[0x0, 0xee00, 0xffffffffffffffff, 0xee01, 0xee00, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0]) write$FUSE_ENTRY(r0, &(0x7f0000000840)={0x90, 0xfffffffffffffffe, 0x7, {0x5, 0x3, 0xfffffffffffffff7, 0x8, 0x1800000, 0x2, {0x4, 0x2ca7, 0x7fffffff, 0x200, 0x3f, 0x8, 0x0, 0xff, 0x100000000, 0x8, 0x9, r1, r2, 0x5, 0x8}}}, 0x90) getgroups(0x1, &(0x7f0000000a40)=[r3]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r0, 0x0, 0x2, &(0x7f0000000040)='\'\x00'}, 0x30) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000a80)={0x0, 0x800}, &(0x7f0000000ac0)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000b00)={r5, @in6={{0xa, 0x4e22, 0xd88, @dev={0xfe, 0x80, [], 0xd}, 0x1}}, 0xffffffff, 0x6, 0x6a42, 0xc4c, 0x2}, 0x98) prctl$PR_SET_THP_DISABLE(0x29, 0x1) get_robust_list(r4, &(0x7f00000009c0)=&(0x7f0000000980)={&(0x7f0000000900)={&(0x7f0000000580)}, 0x0, &(0x7f0000000940)}, &(0x7f0000000a00)=0x18) 03:34:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xb600, &(0x7f00000000c0)={0xd00}) 03:34:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}]}) 03:34:35 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4305}}}}}}}}}, 0x0) 03:34:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x40049409, &(0x7f00000000c0)={0xd00}) 03:34:35 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4788}}}}}}}}}, 0x0) 03:34:35 executing program 2: r0 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x6f, 0x204002) ioctl$RTC_VL_CLR(r0, 0x7014) clone(0x800c0000, &(0x7f0000000000)="3e2121c0d41e1e11a89a32d40f18bf6f8699c5d34155cbee5b342c87c7203ca5c56a22c102680dff6aada2", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="53b2488aca3a583c93bd00687706936931e140c5f2e203ddf74228d5c9ab915be67e7d2389c2fede89272f9a3e8c3a48372625d13b32dbd2d239") syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file1\x00', 0x20040, 0x44) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) 03:34:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'deb.g_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x4020940d, &(0x7f00000000c0)={0xd00}) 03:34:35 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4800}}}}}}}}}, 0x0) 03:34:35 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = pkey_alloc(0x0, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) pkey_free(r0) socket$inet_dccp(0x2, 0x6, 0x0) 03:34:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}]}) 03:34:35 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4888}}}}}}}}}, 0x0) 03:34:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xc0045878, &(0x7f00000000c0)={0xd00}) 03:34:35 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80000, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f00000000c0)=""/158) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x2, 0x0) fstatfs(r1, &(0x7f00000001c0)=""/163) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 946.981020][T13756] EXT4-fs: 17 callbacks suppressed [ 946.981030][T13756] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000, 03:34:35 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6000}}}}}}}}}, 0x0) 03:34:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xc0045878, &(0x7f00000000c0)={0xd00}) 03:34:35 executing program 5 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) [ 947.079879][T13768] EXT4-fs (sda1): Unrecognized mount option "deb.g_want_extra_isize=0x0000000000000000" or missing value [ 947.166011][T13777] FAULT_INJECTION: forcing a failure. [ 947.166011][T13777] name failslab, interval 1, probability 0, space 0, times 0 [ 947.186347][T13777] CPU: 1 PID: 13777 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 947.195389][T13777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 947.205450][T13777] Call Trace: [ 947.208743][T13777] dump_stack+0x172/0x1f0 [ 947.213074][T13777] should_fail.cold+0xa/0x15 [ 947.217659][T13777] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 947.223458][T13777] ? ___might_sleep+0x163/0x280 [ 947.228304][T13777] __should_failslab+0x121/0x190 [ 947.233232][T13777] should_failslab+0x9/0x14 [ 947.237725][T13777] __kmalloc+0x2dc/0x740 [ 947.241968][T13777] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 947.248196][T13777] ? fput_many+0x12c/0x1a0 [ 947.252600][T13777] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 947.258826][T13777] ? strnlen_user+0x1f0/0x280 [ 947.263498][T13777] ? __x64_sys_memfd_create+0x13c/0x470 [ 947.269034][T13777] __x64_sys_memfd_create+0x13c/0x470 [ 947.274395][T13777] ? memfd_fcntl+0x1550/0x1550 [ 947.279168][T13777] ? do_syscall_64+0x26/0x610 [ 947.283833][T13777] ? lockdep_hardirqs_on+0x418/0x5d0 [ 947.289116][T13777] ? trace_hardirqs_on+0x67/0x230 [ 947.294134][T13777] do_syscall_64+0x103/0x610 [ 947.298715][T13777] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 947.304613][T13777] RIP: 0033:0x457e29 [ 947.308495][T13777] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 947.328102][T13777] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 947.336673][T13777] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 947.344632][T13777] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 947.352593][T13777] RBP: 000000000073bf00 R08: 0000000000000020 R09: 00000000fbad8001 03:34:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xc0189436, &(0x7f00000000c0)={0xd00}) [ 947.360552][T13777] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0611a0d6d4 [ 947.368533][T13777] R13: 00000000004c66d4 R14: 00000000004dbc78 R15: 0000000000000003 [ 947.488669][T13786] EXT4-fs (sda1): Unrecognized mount option "deb.g_want_extra_isize=0x0000000000000000" or missing value 03:34:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'deb0g_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:36 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6488}}}}}}}}}, 0x0) 03:34:36 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x64f, 0x80) inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x8) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x800004, 0x0) sendto$inet6(r0, &(0x7f0000000100)="b94c2d47e47f9542dbb2bb355dab", 0xe, 0x8010, &(0x7f0000000140)={0xa, 0x4e20, 0x1, @empty, 0x595c24ee}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in=@remote, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) 03:34:36 executing program 5 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xc020660b, &(0x7f00000000c0)={0xd00}) 03:34:36 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, 0x0) [ 947.624636][T13793] FAULT_INJECTION: forcing a failure. [ 947.624636][T13793] name failslab, interval 1, probability 0, space 0, times 0 [ 947.664090][T13793] CPU: 0 PID: 13793 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 947.673169][T13793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 947.683217][T13793] Call Trace: [ 947.686512][T13793] dump_stack+0x172/0x1f0 [ 947.690860][T13793] should_fail.cold+0xa/0x15 [ 947.695456][T13793] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 947.701395][T13793] ? ___might_sleep+0x163/0x280 [ 947.706245][T13793] __should_failslab+0x121/0x190 [ 947.711190][T13793] ? shmem_destroy_callback+0xc0/0xc0 [ 947.716556][T13793] should_failslab+0x9/0x14 [ 947.721061][T13793] kmem_cache_alloc+0x2b2/0x6f0 [ 947.725909][T13793] ? __alloc_fd+0x430/0x530 [ 947.730409][T13793] ? shmem_destroy_callback+0xc0/0xc0 [ 947.735788][T13793] shmem_alloc_inode+0x1c/0x50 [ 947.740543][T13793] alloc_inode+0x66/0x190 [ 947.744879][T13793] new_inode_pseudo+0x19/0xf0 [ 947.749553][T13793] new_inode+0x1f/0x40 [ 947.753623][T13793] shmem_get_inode+0x84/0x780 [ 947.758315][T13793] __shmem_file_setup.part.0+0x7e/0x2b0 [ 947.763874][T13793] shmem_file_setup+0x66/0x90 [ 947.768545][T13793] __x64_sys_memfd_create+0x2a2/0x470 [ 947.773916][T13793] ? memfd_fcntl+0x1550/0x1550 [ 947.778672][T13793] ? do_syscall_64+0x26/0x610 [ 947.783340][T13793] ? lockdep_hardirqs_on+0x418/0x5d0 [ 947.788627][T13793] ? trace_hardirqs_on+0x67/0x230 [ 947.793644][T13793] do_syscall_64+0x103/0x610 [ 947.798241][T13793] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 947.804126][T13793] RIP: 0033:0x457e29 03:34:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xc0481273, &(0x7f00000000c0)={0xd00}) 03:34:36 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x800e}}}}}}}}}, 0x0) [ 947.808116][T13793] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 947.827731][T13793] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 947.836143][T13793] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 947.844232][T13793] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 947.852197][T13793] RBP: 000000000073bf00 R08: 0000000000000020 R09: 00000000fbad8001 [ 947.860251][T13793] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0611a0d6d4 03:34:36 executing program 5 (fault-call:2 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) [ 947.868214][T13793] R13: 00000000004c66d4 R14: 00000000004dbc78 R15: 0000000000000003 03:34:36 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8035}}}}}}}}}, 0x0) 03:34:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xffffff1f, &(0x7f00000000c0)={0xd00}) [ 948.013256][T13805] EXT4-fs (sda1): Unrecognized mount option "deb0g_want_extra_isize=0x0000000000000000" or missing value [ 948.015897][T13811] FAULT_INJECTION: forcing a failure. [ 948.015897][T13811] name failslab, interval 1, probability 0, space 0, times 0 [ 948.074362][T13811] CPU: 0 PID: 13811 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 948.083518][T13811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 948.093653][T13811] Call Trace: [ 948.096958][T13811] dump_stack+0x172/0x1f0 [ 948.101303][T13811] should_fail.cold+0xa/0x15 [ 948.105897][T13811] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 948.111724][T13811] ? ___might_sleep+0x163/0x280 [ 948.116573][T13811] __should_failslab+0x121/0x190 [ 948.121527][T13811] should_failslab+0x9/0x14 [ 948.126111][T13811] kmem_cache_alloc+0x2b2/0x6f0 [ 948.130972][T13811] ? current_time+0x6b/0x140 [ 948.135574][T13811] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 948.141371][T13811] ? lockdep_hardirqs_on+0x418/0x5d0 [ 948.146649][T13811] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 948.152881][T13811] ? timespec64_trunc+0xf0/0x180 [ 948.157812][T13811] __d_alloc+0x2e/0x8c0 [ 948.161972][T13811] d_alloc_pseudo+0x1e/0x30 [ 948.166472][T13811] alloc_file_pseudo+0xe2/0x280 03:34:36 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 948.171324][T13811] ? alloc_file+0x4d0/0x4d0 [ 948.175833][T13811] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 948.182097][T13811] __shmem_file_setup.part.0+0x108/0x2b0 [ 948.187724][T13811] shmem_file_setup+0x66/0x90 [ 948.192395][T13811] __x64_sys_memfd_create+0x2a2/0x470 [ 948.197758][T13811] ? memfd_fcntl+0x1550/0x1550 [ 948.202507][T13811] ? do_syscall_64+0x26/0x610 [ 948.207180][T13811] ? lockdep_hardirqs_on+0x418/0x5d0 [ 948.212479][T13811] ? trace_hardirqs_on+0x67/0x230 [ 948.217502][T13811] do_syscall_64+0x103/0x610 [ 948.222090][T13811] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 948.227971][T13811] RIP: 0033:0x457e29 [ 948.231881][T13811] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 948.251679][T13811] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 948.260093][T13811] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 948.268064][T13811] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 948.276041][T13811] RBP: 000000000073bf00 R08: 0000000000000020 R09: 00000000fbad8001 [ 948.284003][T13811] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0611a0d6d4 [ 948.291970][T13811] R13: 00000000004c66d4 R14: 00000000004dbc78 R15: 0000000000000003 [ 948.387652][T13823] EXT4-fs (sda1): Unrecognized mount option "deb0g_want_extra_isize=0x0000000000000000" or missing value 03:34:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debXg_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:37 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8100}}}}}}}}}, 0x0) 03:34:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd02}) 03:34:37 executing program 5 (fault-call:2 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:37 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffffcab, 0x0, 0x0, 0x0, 0x0) 03:34:37 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfc41, 0x0, 0x0, 0x0) [ 948.580875][T13832] FAULT_INJECTION: forcing a failure. [ 948.580875][T13832] name failslab, interval 1, probability 0, space 0, times 0 [ 948.603234][T13832] CPU: 1 PID: 13832 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 948.612262][T13832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 948.622307][T13832] Call Trace: [ 948.625697][T13832] dump_stack+0x172/0x1f0 [ 948.630034][T13832] should_fail.cold+0xa/0x15 [ 948.634633][T13832] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 948.640430][T13832] ? ___might_sleep+0x163/0x280 [ 948.645279][T13832] __should_failslab+0x121/0x190 [ 948.650210][T13832] should_failslab+0x9/0x14 [ 948.654704][T13832] kmem_cache_alloc+0x2b2/0x6f0 [ 948.659543][T13832] ? current_time+0x6b/0x140 [ 948.664118][T13832] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 948.669910][T13832] ? lockdep_hardirqs_on+0x418/0x5d0 [ 948.675181][T13832] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 948.681422][T13832] ? timespec64_trunc+0xf0/0x180 [ 948.686351][T13832] __d_alloc+0x2e/0x8c0 [ 948.690761][T13832] d_alloc_pseudo+0x1e/0x30 [ 948.695256][T13832] alloc_file_pseudo+0xe2/0x280 [ 948.700098][T13832] ? alloc_file+0x4d0/0x4d0 [ 948.704602][T13832] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 948.710861][T13832] __shmem_file_setup.part.0+0x108/0x2b0 [ 948.716490][T13832] shmem_file_setup+0x66/0x90 [ 948.721167][T13832] __x64_sys_memfd_create+0x2a2/0x470 [ 948.726551][T13832] ? memfd_fcntl+0x1550/0x1550 [ 948.731328][T13832] ? do_syscall_64+0x26/0x610 [ 948.735991][T13832] ? lockdep_hardirqs_on+0x418/0x5d0 [ 948.741265][T13832] ? trace_hardirqs_on+0x67/0x230 [ 948.746293][T13832] do_syscall_64+0x103/0x610 [ 948.750881][T13832] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 948.756760][T13832] RIP: 0033:0x457e29 [ 948.760640][T13832] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:34:37 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8847}}}}}}}}}, 0x0) 03:34:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd04}) [ 948.780231][T13832] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 948.788628][T13832] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 948.796590][T13832] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 948.804544][T13832] RBP: 000000000073bf00 R08: 0000000000000020 R09: 00000000fbad8001 [ 948.812497][T13832] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0611a0d6d4 [ 948.820452][T13832] R13: 00000000004c66d4 R14: 00000000004dbc78 R15: 0000000000000003 03:34:37 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xfff, 0x204000) pread64(r0, &(0x7f0000000200)=""/203, 0xcb, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000001c0)=0x4) fstat(r0, &(0x7f0000000100)) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f0000000180)={0x3, r0, 0x1}) 03:34:37 executing program 5 (fault-call:2 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:37 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8848}}}}}}}}}, 0x0) [ 948.922492][T13847] FAULT_INJECTION: forcing a failure. [ 948.922492][T13847] name failslab, interval 1, probability 0, space 0, times 0 [ 948.948566][T13838] EXT4-fs (sda1): Unrecognized mount option "debXg_want_extra_isize=0x0000000000000000" or missing value [ 948.959955][T13847] CPU: 0 PID: 13847 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 948.968974][T13847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 948.979017][T13847] Call Trace: [ 948.982307][T13847] dump_stack+0x172/0x1f0 [ 948.986648][T13847] should_fail.cold+0xa/0x15 [ 948.991260][T13847] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 948.997071][T13847] ? ___might_sleep+0x163/0x280 [ 949.002015][T13847] __should_failslab+0x121/0x190 [ 949.006950][T13847] should_failslab+0x9/0x14 [ 949.011447][T13847] kmem_cache_alloc+0x2b2/0x6f0 [ 949.016302][T13847] __alloc_file+0x27/0x300 [ 949.020737][T13847] alloc_empty_file+0x72/0x170 [ 949.025499][T13847] alloc_file+0x5e/0x4d0 [ 949.029836][T13847] alloc_file_pseudo+0x189/0x280 [ 949.034770][T13847] ? alloc_file+0x4d0/0x4d0 [ 949.039370][T13847] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 949.045614][T13847] __shmem_file_setup.part.0+0x108/0x2b0 [ 949.045634][T13847] shmem_file_setup+0x66/0x90 [ 949.045653][T13847] __x64_sys_memfd_create+0x2a2/0x470 [ 949.045669][T13847] ? memfd_fcntl+0x1550/0x1550 [ 949.045682][T13847] ? do_syscall_64+0x26/0x610 [ 949.045702][T13847] ? lockdep_hardirqs_on+0x418/0x5d0 [ 949.076008][T13847] ? trace_hardirqs_on+0x67/0x230 [ 949.081040][T13847] do_syscall_64+0x103/0x610 [ 949.085636][T13847] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 949.091525][T13847] RIP: 0033:0x457e29 [ 949.095414][T13847] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:34:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd09}) [ 949.095423][T13847] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 949.095437][T13847] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457e29 [ 949.095446][T13847] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce27 [ 949.095454][T13847] RBP: 000000000073bf00 R08: 0000000000000020 R09: 00000000fbad8001 [ 949.095463][T13847] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0611a0d6d4 [ 949.095469][T13847] R13: 00000000004c66d4 R14: 00000000004dbc78 R15: 0000000000000003 [ 949.312534][T13860] EXT4-fs (sda1): Unrecognized mount option "debXg_want_extra_isize=0x0000000000000000" or missing value 03:34:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debcg_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:38 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x118) getpeername$netlink(r0, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:34:38 executing program 5 (fault-call:2 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:38 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8864}}}}}}}}}, 0x0) 03:34:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd0d}) 03:34:38 executing program 0: 03:34:38 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8906}}}}}}}}}, 0x0) [ 949.430331][T13869] FAULT_INJECTION: forcing a failure. [ 949.430331][T13869] name failslab, interval 1, probability 0, space 0, times 0 [ 949.462211][T13869] CPU: 0 PID: 13869 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 03:34:38 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd, 0xfffffd53, 0x0, 0x20000, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = creat(&(0x7f0000000000)='./file1\x00', 0x22) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@multicast1, @in6}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xe8) [ 949.471351][T13869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 949.481497][T13869] Call Trace: [ 949.481522][T13869] dump_stack+0x172/0x1f0 [ 949.481543][T13869] should_fail.cold+0xa/0x15 [ 949.481563][T13869] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 949.481584][T13869] ? ___might_sleep+0x163/0x280 [ 949.481604][T13869] __should_failslab+0x121/0x190 [ 949.481626][T13869] should_failslab+0x9/0x14 [ 949.481642][T13869] kmem_cache_alloc+0x2b2/0x6f0 [ 949.481658][T13869] ? notify_change+0x6d5/0xfb0 [ 949.481672][T13869] ? do_sys_ftruncate+0x41e/0x550 [ 949.481690][T13869] getname_flags+0xd6/0x5b0 [ 949.493857][T13869] getname+0x1a/0x20 [ 949.493875][T13869] do_sys_open+0x2c9/0x5d0 [ 949.493893][T13869] ? filp_open+0x80/0x80 [ 949.545536][T13869] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 949.551802][T13869] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 949.557261][T13869] ? do_syscall_64+0x26/0x610 [ 949.561942][T13869] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 949.568006][T13869] ? do_syscall_64+0x26/0x610 [ 949.572688][T13869] __x64_sys_open+0x7e/0xc0 [ 949.577190][T13869] do_syscall_64+0x103/0x610 [ 949.581801][T13869] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 949.587679][T13869] RIP: 0033:0x411f11 [ 949.587694][T13869] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 949.611472][T13869] RSP: 002b:00007f0611a0ca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 949.611486][T13869] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 03:34:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd1b}) [ 949.611493][T13869] RDX: 00007f0611a0cafa RSI: 0000000000000002 RDI: 00007f0611a0caf0 [ 949.611500][T13869] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 949.611509][T13869] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 949.611517][T13869] R13: 0000000000000000 R14: 00000000004dbc78 R15: 0000000000000003 03:34:38 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0xf000}}}}}}}}}, 0x0) 03:34:38 executing program 5 (fault-call:2 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd1d}) [ 949.793381][T13876] EXT4-fs (sda1): Unrecognized mount option "debcg_want_extra_isize=0x0000000000000000" or missing value [ 949.835706][T13889] FAULT_INJECTION: forcing a failure. [ 949.835706][T13889] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 949.848945][T13889] CPU: 0 PID: 13889 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 949.858242][T13889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 949.868284][T13889] Call Trace: [ 949.871568][T13889] dump_stack+0x172/0x1f0 [ 949.875886][T13889] should_fail.cold+0xa/0x15 [ 949.880456][T13889] ? __lock_acquire+0x548/0x3fb0 [ 949.885382][T13889] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 949.891167][T13889] ? __lock_acquire+0x548/0x3fb0 [ 949.896180][T13889] should_fail_alloc_page+0x50/0x60 [ 949.901358][T13889] __alloc_pages_nodemask+0x1a1/0x7e0 [ 949.906721][T13889] ? __alloc_pages_slowpath+0x2900/0x2900 [ 949.912415][T13889] ? find_held_lock+0x35/0x130 [ 949.917161][T13889] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 949.922967][T13889] cache_grow_begin+0x9c/0x860 [ 949.927709][T13889] ? getname_flags+0xd6/0x5b0 [ 949.932364][T13889] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 949.938584][T13889] kmem_cache_alloc+0x62d/0x6f0 [ 949.943414][T13889] ? notify_change+0x6d5/0xfb0 [ 949.948157][T13889] ? do_sys_ftruncate+0x41e/0x550 [ 949.953163][T13889] getname_flags+0xd6/0x5b0 [ 949.957642][T13889] getname+0x1a/0x20 [ 949.961513][T13889] do_sys_open+0x2c9/0x5d0 [ 949.965913][T13889] ? filp_open+0x80/0x80 [ 949.970132][T13889] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 949.976354][T13889] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 949.981797][T13889] ? do_syscall_64+0x26/0x610 [ 949.986451][T13889] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 949.992510][T13889] ? do_syscall_64+0x26/0x610 [ 949.997169][T13889] __x64_sys_open+0x7e/0xc0 [ 950.001651][T13889] do_syscall_64+0x103/0x610 [ 950.006311][T13889] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 950.012182][T13889] RIP: 0033:0x411f11 [ 950.016055][T13889] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 950.035649][T13889] RSP: 002b:00007f0611a0ca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 950.044125][T13889] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 [ 950.052275][T13889] RDX: 00007f0611a0cafa RSI: 0000000000000002 RDI: 00007f0611a0caf0 [ 950.060315][T13889] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 950.068265][T13889] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 950.076214][T13889] R13: 0000000000000000 R14: 00000000004dbc78 R15: 0000000000000003 [ 950.171986][T13892] EXT4-fs (sda1): Unrecognized mount option "debcg_want_extra_isize=0x0000000000000000" or missing value 03:34:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debdg_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:38 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f00000000c0)={0x3, 0x4}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:34:38 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x104, 0x80000) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) waitid(0x0, r1, &(0x7f00000000c0), 0x1000000, &(0x7f0000000140)) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000040)={0x9, 0x0, 0x10003, 0xfffffffffffffffd}) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000200)=ANY=[@ANYBLOB="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"]) 03:34:38 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0xf0ffff}}}}}}}}}, 0x0) 03:34:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd37}) 03:34:38 executing program 5 (fault-call:2 fault-nth:7): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xdb6}) 03:34:39 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1000000}}}}}}}}}, 0x0) 03:34:39 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x800, 0x0) [ 950.355162][T13906] FAULT_INJECTION: forcing a failure. [ 950.355162][T13906] name failslab, interval 1, probability 0, space 0, times 0 [ 950.395015][T13906] CPU: 0 PID: 13906 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 950.404190][T13906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 950.414237][T13906] Call Trace: [ 950.417530][T13906] dump_stack+0x172/0x1f0 [ 950.421864][T13906] should_fail.cold+0xa/0x15 [ 950.426464][T13906] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 950.432285][T13906] ? ___might_sleep+0x163/0x280 [ 950.437136][T13906] __should_failslab+0x121/0x190 [ 950.442073][T13906] should_failslab+0x9/0x14 [ 950.446571][T13906] kmem_cache_alloc+0x2b2/0x6f0 [ 950.451424][T13906] ? __save_stack_trace+0x8a/0xf0 [ 950.456452][T13906] __alloc_file+0x27/0x300 [ 950.460866][T13906] alloc_empty_file+0x72/0x170 [ 950.465625][T13906] path_openat+0xef/0x46e0 [ 950.470048][T13906] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 950.475849][T13906] ? kasan_slab_alloc+0xf/0x20 [ 950.480608][T13906] ? kmem_cache_alloc+0x11a/0x6f0 [ 950.485639][T13906] ? getname_flags+0xd6/0x5b0 [ 950.490305][T13906] ? getname+0x1a/0x20 [ 950.494371][T13906] ? do_sys_open+0x2c9/0x5d0 [ 950.498953][T13906] ? __x64_sys_open+0x7e/0xc0 [ 950.503623][T13906] ? do_syscall_64+0x103/0x610 [ 950.508377][T13906] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 950.514441][T13906] ? __lock_acquire+0x548/0x3fb0 [ 950.519382][T13906] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 950.524755][T13906] ? __alloc_fd+0x430/0x530 [ 950.529290][T13906] do_filp_open+0x1a1/0x280 [ 950.533795][T13906] ? may_open_dev+0x100/0x100 [ 950.538467][T13906] ? lock_downgrade+0x880/0x880 [ 950.543315][T13906] ? kasan_check_read+0x11/0x20 [ 950.548159][T13906] ? do_raw_spin_unlock+0x57/0x270 [ 950.553263][T13906] ? _raw_spin_unlock+0x2d/0x50 [ 950.558223][T13906] ? __alloc_fd+0x430/0x530 [ 950.562739][T13906] do_sys_open+0x3fe/0x5d0 [ 950.567166][T13906] ? filp_open+0x80/0x80 [ 950.571402][T13906] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 950.577727][T13906] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 950.583189][T13906] ? do_syscall_64+0x26/0x610 [ 950.587855][T13906] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 950.593935][T13906] ? do_syscall_64+0x26/0x610 [ 950.598617][T13906] __x64_sys_open+0x7e/0xc0 [ 950.603128][T13906] do_syscall_64+0x103/0x610 [ 950.607724][T13906] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 950.613612][T13906] RIP: 0033:0x411f11 [ 950.617518][T13906] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 950.637114][T13906] RSP: 002b:00007f0611a0ca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 950.645605][T13906] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 [ 950.653568][T13906] RDX: 00007f0611a0cafa RSI: 0000000000000002 RDI: 00007f0611a0caf0 [ 950.661524][T13906] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 950.669594][T13906] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 950.677550][T13906] R13: 0000000000000000 R14: 00000000004dbc78 R15: 0000000000000003 03:34:39 executing program 5 (fault-call:2 fault-nth:8): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:39 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$isdn_base(0x22, 0x3, 0x0) 03:34:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0x40000}) [ 950.718627][T13910] EXT4-fs (sda1): Unrecognized mount option "debdg_want_extra_isize=0x0000000000000000" or missing value [ 950.770449][T13921] FAULT_INJECTION: forcing a failure. [ 950.770449][T13921] name failslab, interval 1, probability 0, space 0, times 0 [ 950.784876][T13921] CPU: 0 PID: 13921 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 950.793895][T13921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 950.803935][T13921] Call Trace: [ 950.807234][T13921] dump_stack+0x172/0x1f0 [ 950.811559][T13921] should_fail.cold+0xa/0x15 [ 950.816142][T13921] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 950.821941][T13921] ? ___might_sleep+0x163/0x280 [ 950.826838][T13921] __should_failslab+0x121/0x190 [ 950.831774][T13921] should_failslab+0x9/0x14 [ 950.836270][T13921] kmem_cache_alloc+0x2b2/0x6f0 [ 950.841114][T13921] ? __save_stack_trace+0x8a/0xf0 [ 950.846134][T13921] __alloc_file+0x27/0x300 [ 950.850541][T13921] alloc_empty_file+0x72/0x170 [ 950.855291][T13921] path_openat+0xef/0x46e0 [ 950.859706][T13921] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 950.865547][T13921] ? kasan_slab_alloc+0xf/0x20 [ 950.870297][T13921] ? kmem_cache_alloc+0x11a/0x6f0 [ 950.875322][T13921] ? getname_flags+0xd6/0x5b0 [ 950.879984][T13921] ? getname+0x1a/0x20 [ 950.884043][T13921] ? do_sys_open+0x2c9/0x5d0 [ 950.888631][T13921] ? __x64_sys_open+0x7e/0xc0 [ 950.893299][T13921] ? do_syscall_64+0x103/0x610 [ 950.898053][T13921] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 950.904141][T13921] ? __lock_acquire+0x548/0x3fb0 [ 950.909073][T13921] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 950.914441][T13921] ? __alloc_fd+0x430/0x530 [ 950.919046][T13921] do_filp_open+0x1a1/0x280 [ 950.923540][T13921] ? may_open_dev+0x100/0x100 [ 950.928229][T13921] ? lock_downgrade+0x880/0x880 [ 950.933091][T13921] ? kasan_check_read+0x11/0x20 [ 950.937934][T13921] ? do_raw_spin_unlock+0x57/0x270 [ 950.943032][T13921] ? _raw_spin_unlock+0x2d/0x50 [ 950.947871][T13921] ? __alloc_fd+0x430/0x530 [ 950.952377][T13921] do_sys_open+0x3fe/0x5d0 [ 950.956910][T13921] ? filp_open+0x80/0x80 [ 950.961141][T13921] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 950.967377][T13921] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 950.972826][T13921] ? do_syscall_64+0x26/0x610 [ 950.977493][T13921] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 950.983562][T13921] ? do_syscall_64+0x26/0x610 [ 950.988230][T13921] __x64_sys_open+0x7e/0xc0 [ 950.992725][T13921] do_syscall_64+0x103/0x610 [ 950.997321][T13921] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 951.003198][T13921] RIP: 0033:0x411f11 [ 951.007082][T13921] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 951.026764][T13921] RSP: 002b:00007f0611a0ca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 951.035262][T13921] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411f11 [ 951.043242][T13921] RDX: 00007f0611a0cafa RSI: 0000000000000002 RDI: 00007f0611a0caf0 [ 951.051201][T13921] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 951.059156][T13921] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 951.067144][T13921] R13: 0000000000000000 R14: 00000000004dbc78 R15: 0000000000000003 03:34:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debig_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:39 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2000000}}}}}}}}}, 0x0) 03:34:39 executing program 5 (fault-call:2 fault-nth:9): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0x20000dce}) 03:34:39 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0xc4003, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f00000000c0)=0x5) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3ca, 0x0, 0x0, 0x0) 03:34:39 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8000000}}}}}}}}}, 0x0) 03:34:39 executing program 2: getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=@random={'user.', '\x00'}, &(0x7f0000000100)=""/18, 0xfffffffffffffd47) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:34:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x2}) [ 951.353753][T13939] FAULT_INJECTION: forcing a failure. [ 951.353753][T13939] name failslab, interval 1, probability 0, space 0, times 0 [ 951.384622][T13939] CPU: 0 PID: 13939 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 951.393856][T13939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 951.403904][T13939] Call Trace: [ 951.407187][T13939] dump_stack+0x172/0x1f0 [ 951.411516][T13939] should_fail.cold+0xa/0x15 [ 951.416218][T13939] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 951.422019][T13939] ? ___might_sleep+0x163/0x280 [ 951.426867][T13939] __should_failslab+0x121/0x190 [ 951.431801][T13939] should_failslab+0x9/0x14 [ 951.436297][T13939] kmem_cache_alloc+0x2b2/0x6f0 [ 951.441159][T13939] ? __schedule+0x1387/0x1cc0 [ 951.445838][T13939] __kernfs_new_node+0xef/0x690 [ 951.450676][T13939] ? _raw_spin_unlock_irq+0x28/0x90 [ 951.455957][T13939] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 951.461409][T13939] ? kasan_check_read+0x11/0x20 [ 951.466255][T13939] ? _raw_spin_unlock_irq+0x5e/0x90 [ 951.471449][T13939] ? __schedule+0x1387/0x1cc0 [ 951.476144][T13939] ? __lock_acquire+0x548/0x3fb0 [ 951.481084][T13939] kernfs_new_node+0x99/0x130 [ 951.485774][T13939] kernfs_create_dir_ns+0x52/0x160 [ 951.490972][T13939] internal_create_group+0x7f8/0xc40 [ 951.496249][T13939] ? bd_set_size+0x89/0xb0 [ 951.500674][T13939] ? remove_files.isra.0+0x190/0x190 [ 951.505963][T13939] sysfs_create_group+0x20/0x30 [ 951.510812][T13939] lo_ioctl+0x10af/0x2150 [ 951.515145][T13939] ? lo_rw_aio+0x1120/0x1120 [ 951.519748][T13939] blkdev_ioctl+0xee8/0x1c40 [ 951.524358][T13939] ? blkpg_ioctl+0xa90/0xa90 [ 951.528953][T13939] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 951.534790][T13939] ? __fget+0x35a/0x550 [ 951.539117][T13939] block_ioctl+0xee/0x130 [ 951.543457][T13939] ? blkdev_fallocate+0x410/0x410 [ 951.548479][T13939] do_vfs_ioctl+0xd6e/0x1390 [ 951.553072][T13939] ? ioctl_preallocate+0x210/0x210 [ 951.558200][T13939] ? __fget+0x381/0x550 [ 951.562356][T13939] ? ksys_dup3+0x3e0/0x3e0 [ 951.566767][T13939] ? do_sys_open+0x31d/0x5d0 [ 951.571352][T13939] ? tomoyo_file_ioctl+0x23/0x30 [ 951.576302][T13939] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 951.582535][T13939] ? security_file_ioctl+0x93/0xc0 [ 951.587636][T13939] ksys_ioctl+0xab/0xd0 [ 951.591791][T13939] __x64_sys_ioctl+0x73/0xb0 [ 951.596384][T13939] do_syscall_64+0x103/0x610 [ 951.600966][T13939] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 951.606843][T13939] RIP: 0033:0x457c97 [ 951.610833][T13939] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 951.630512][T13939] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 951.639029][T13939] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 951.646987][T13939] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 03:34:40 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000000)='self(\x00', 0x2) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x20000, 0x0) perf_event_open$cgroup(&(0x7f00000015c0)={0x2, 0x70, 0xb5, 0x5, 0x8001, 0x20, 0x0, 0x20, 0x20000, 0x6, 0x6, 0x8, 0x2, 0xc2af423, 0x8, 0x0, 0x3f, 0x3, 0x8, 0xb51, 0x7, 0x1, 0xf5c, 0xfff, 0x0, 0xfffffffffffffff9, 0x2, 0xfffffffffffffff8, 0x2, 0x0, 0x9, 0x0, 0x4, 0xc6, 0x5, 0x51ae, 0x9, 0xc55, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000001580), 0x3}, 0x80, 0x7, 0xffffffffffffffff, 0x1, 0xd260, 0x0, 0x6f8}, r1, 0x1, r1, 0x8) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000100)) fsetxattr$security_capability(r0, &(0x7f0000001640)='security.capability\x00', &(0x7f0000001680)=@v2={0x2000000, [{0x2, 0x1}, {0x1, 0x4}]}, 0x14, 0x3) lgetxattr(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)=@known='com.apple.system.Security\x00', &(0x7f0000000580)=""/4096, 0x1000) [ 951.654966][T13939] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 951.662928][T13939] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 951.670889][T13939] R13: 0000000000000000 R14: 00000000004dbc78 R15: 0000000000000003 03:34:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x4}) 03:34:40 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8060000}}}}}}}}}, 0x0) 03:34:40 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2202000, 0x0) 03:34:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'deblg_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:40 executing program 5 (fault-call:2 fault-nth:10): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x9}) 03:34:40 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0xd000000}}}}}}}}}, 0x0) 03:34:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xd}) 03:34:40 executing program 2: getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x14, 0x0, &(0x7f00000000c0), &(0x7f0000000100)='GPL\x00', 0x100000000, 0x67, &(0x7f0000000140)=""/103, 0x40f00, 0x1, [], r0, 0xa}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e4) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, &(0x7f00000000c0)={0x1, 0x3002, 0x5, 0x4, 0x15}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:34:40 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x20000000}}}}}}}}}, 0x0) 03:34:40 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x400, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={0x0, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x11}}, {0x2, 0x4e20, @remote}, {0x2, 0x0, @multicast1}, 0x1a8, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6, 0x3c, 0x8001}) accept$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f0000000100)=0x10) [ 952.134491][T13972] FAULT_INJECTION: forcing a failure. [ 952.134491][T13972] name failslab, interval 1, probability 0, space 0, times 0 [ 952.147281][T13972] CPU: 0 PID: 13972 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 952.156296][T13972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 952.166344][T13972] Call Trace: [ 952.169635][T13972] dump_stack+0x172/0x1f0 [ 952.173970][T13972] should_fail.cold+0xa/0x15 [ 952.178557][T13972] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 952.184364][T13972] ? ___might_sleep+0x163/0x280 [ 952.189316][T13972] __should_failslab+0x121/0x190 [ 952.194250][T13972] should_failslab+0x9/0x14 [ 952.198745][T13972] kmem_cache_alloc+0x2b2/0x6f0 [ 952.203589][T13972] ? __schedule+0x1387/0x1cc0 [ 952.208278][T13972] __kernfs_new_node+0xef/0x690 [ 952.213129][T13972] ? _raw_spin_unlock_irq+0x28/0x90 [ 952.218436][T13972] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 952.223881][T13972] ? kasan_check_read+0x11/0x20 [ 952.228734][T13972] ? _raw_spin_unlock_irq+0x5e/0x90 [ 952.233925][T13972] ? __schedule+0x1387/0x1cc0 [ 952.238629][T13972] ? __lock_acquire+0x548/0x3fb0 [ 952.243667][T13972] kernfs_new_node+0x99/0x130 [ 952.248366][T13972] kernfs_create_dir_ns+0x52/0x160 [ 952.253478][T13972] internal_create_group+0x7f8/0xc40 [ 952.258750][T13972] ? bd_set_size+0x89/0xb0 [ 952.263165][T13972] ? remove_files.isra.0+0x190/0x190 [ 952.268484][T13972] sysfs_create_group+0x20/0x30 [ 952.273325][T13972] lo_ioctl+0x10af/0x2150 [ 952.277648][T13972] ? lo_rw_aio+0x1120/0x1120 [ 952.282232][T13972] blkdev_ioctl+0xee8/0x1c40 [ 952.286833][T13972] ? blkpg_ioctl+0xa90/0xa90 [ 952.291517][T13972] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 952.297328][T13972] ? __fget+0x35a/0x550 [ 952.301481][T13972] block_ioctl+0xee/0x130 [ 952.305890][T13972] ? blkdev_fallocate+0x410/0x410 [ 952.310931][T13972] do_vfs_ioctl+0xd6e/0x1390 [ 952.315520][T13972] ? ioctl_preallocate+0x210/0x210 [ 952.320634][T13972] ? __fget+0x381/0x550 [ 952.324818][T13972] ? ksys_dup3+0x3e0/0x3e0 [ 952.329327][T13972] ? do_sys_open+0x31d/0x5d0 [ 952.333916][T13972] ? tomoyo_file_ioctl+0x23/0x30 [ 952.338846][T13972] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 952.345127][T13972] ? security_file_ioctl+0x93/0xc0 [ 952.350285][T13972] ksys_ioctl+0xab/0xd0 [ 952.354437][T13972] __x64_sys_ioctl+0x73/0xb0 [ 952.359035][T13972] do_syscall_64+0x103/0x610 [ 952.363666][T13972] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 952.369550][T13972] RIP: 0033:0x457c97 [ 952.373530][T13972] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 952.393242][T13972] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 952.401641][T13972] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 952.409601][T13972] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 952.417563][T13972] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 952.425612][T13972] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 03:34:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x10}) 03:34:41 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x28000000}}}}}}}}}, 0x0) [ 952.433594][T13972] R13: 0000000000000000 R14: 00000000004dbc78 R15: 0000000000000003 [ 952.465922][T13983] QAT: Invalid ioctl [ 952.470500][T13983] QAT: Invalid ioctl 03:34:41 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x30000000}}}}}}}}}, 0x0) 03:34:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x1b}) [ 952.538258][T13989] EXT4-fs: 3 callbacks suppressed [ 952.538267][T13989] EXT4-fs (sda1): Unrecognized mount option "deblg_want_extra_isize=0x0000000000000000" or missing value [ 952.713071][T13983] QAT: Invalid ioctl [ 952.722281][T14003] QAT: Invalid ioctl [ 952.760574][T14004] EXT4-fs (sda1): Unrecognized mount option "deblg_want_extra_isize=0x0000000000000000" or missing value 03:34:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debog_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:41 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3f000000}}}}}}}}}, 0x0) 03:34:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x1d}) 03:34:41 executing program 5 (fault-call:2 fault-nth:11): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x13) close(r0) 03:34:41 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x43050000}}}}}}}}}, 0x0) 03:34:41 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4, 0x101000) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) 03:34:41 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000d40)=0xe8) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xfc14, 0xa, &(0x7f00000009c0)=[{&(0x7f00000002c0)="e4c715a74a1f5d839bc4f6e2a1e725ec5d8144d6e2008d90136ae5fd73babf141f9f4d6f86dbc49784317f7ebeb78bcfe7ee56cce719d6a000f0b5ff31f7d812caca0a1b6cf2014d17bf80ed44f14491f913c560fbd0b312902f8ded235038ea4f64b78954b189c38e7a55bbf64b2bba8e0abe4a5ff2d93f4af8e8ff53afedd4447d96171034fa5b409efd1b6014f987f01eddbc2e429314e2e197f832bfbef3cc0df3f2bda90387", 0xa8, 0x10001}, {&(0x7f0000000380)="05c6fc7286eb6d23c48e98e9d8bb6f88d1f4728786fee64d647633f960b352c5e5c0e957756bfb9965840236d8d229c6972961eeca22024e54dc7e64ed4cd15ff39c08e5f0303f05caae239e96133bc41b59a731ad9921be304af83e4f6f29fe2777daa712bcc9241dc4f8c99f8f2ce47009c166b9643dc30d9bbd64cfcb9190d5ef7a4e2bd12b566ceff684cfc17c457a61f5fddc71fdc2c476733ed3fd1dbc3468a6e2457a6e23604581a07eae752a766d8992a84cad55409f2d0e2456cab6336cc29b15f7eb73a3a24c44447a3ffb697e", 0xd2, 0x200000000000}, {&(0x7f0000000480)="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", 0xff, 0x29cc000000000000}, {&(0x7f0000000580)="10c1041f125deea01e036c4afe69de88e577572cf2f2234db82cd9c395e274019f0776d5a4478da1e5047a32105079a08567860bdf7ffdfaae8fc0fabe82dd83bc854be0adcfb574a0b3ae102c2f1a6e70b56794c63e5f58696cf2eb6c837064387d0c463c4a9e2e4b38b864091429016b700e960880170ac0dabfa71e265f1e34aa5001f3e29eec87e44151c790e03b7ae3d33c7463b9c87f225624f66677a5b31274b46d84cdc6ae26838f2e9b06e976cf6b8b", 0xb4, 0xc5}, {&(0x7f0000000640)="7707fb11d4fee400a8324e9c2e8f4e86d423b708f7fa73cf79095cac83c58308ee33f7130d86f8f34f7c0030b20aee5dfc6db4f8a3e2b360c84b597ef11e6f8b03e80ce9a62fc54c59dc8f46334351af1c4d91274f94013dce9257470049e6b922ca240986f606a11c6991d74bd42571ea23132ead2bcc9f5a7af9638019711e83f31cedc9ac014bdae87bc18a484725be936d910385de", 0x97, 0x7}, {&(0x7f0000000700)="003034274ed5591560a44f97906079ee4530e036548ad438046f26a64ef7f485796355dd9a3c4c95ff8844e448d8e259f78db9e391ba2784db39d16c42669eb530cd37e6368e1523217dee0ff778d67af8b2c3a6c2f23b5bf146a8dd49d50ea8cf444351c0", 0x65, 0x4}, {&(0x7f0000000780)="c7c97ebff8072713c873575858b1f8bd8e09ef0fd2cb4b1b0e2a91199847d70fd43d647e9394299e0e93f551442e909cb4b99edd56a06af3d832378a371f5382745fba498facd7f01d73ba6b13dc404ed972fc9859441c2b063c2cf410e322a06f0a0d3f12fbec3c0e0b734d6112988bb5e2616b0d858925", 0x78, 0x10000}, {&(0x7f0000000800)="ec00e0c6ed3b76157df198c0637a2c1de1a13da1d04073a32f9523973cf2", 0x1e, 0x80}, {&(0x7f0000000840)="0dc62c850853c79d50bc393d8327a4e2d55b00aadc4bfcc78b53712696cadcf66301c358747e853f92d798dc18796b3d9f16050732aaee460cf515aee260e8a657ecf6a9e960dc4678646bc1e77c2327de3fff81983ce4d629828d72b2e46d45bc307e16a69ab60638a28826dd1e67464872c3594b3b50e544734b41d662ab8795f1fdce8dfb01a08ef7948875fa0ccf522008aabfc9fc574adb3c2e0bf2a75469a89ec343ec7fe345835426e106b3d301f1729e6cbc0e8feb08014a1f", 0xbd, 0x7fff}, {&(0x7f0000000900)="ed7e4df2d09148002ee34f1b916b40b18f98bc67ec4fc809f33e1d0508cadc2c8d63dc100a706bcad54760bcacb7e41a400a735124f2ecbe1dd29af3c4976066cf4a2bf19940ed863433c793bc322624bc59749b915faf6e4bb7108387cd4936c6f62a0c6de2441abdf9e32caec4a44e6600001c20e002d60dd8cea39ce40c757d3b35f65b16df178736", 0x8a, 0x5}], 0x41, &(0x7f0000000d80)={[{@gid={'gid', 0x3d, r0}}, {@case_sensitive_no='case_sensitive=no'}, {@umask={'umask', 0x3d, 0x5}}, {@disable_sparse_no='disable_sparse=no'}, {@show_sys_files_yes='show_sys_files=yes'}], [{@subj_user={'subj_user', 0x3d, 'jfs\x00'}}, {@euid_eq={'euid', 0x3d, r1}}, {@hash='hash'}, {@fowner_gt={'fowner>', r2}}]}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000000)='./file0\x00', r3, r4) [ 952.940109][T14017] FAULT_INJECTION: forcing a failure. [ 952.940109][T14017] name failslab, interval 1, probability 0, space 0, times 0 [ 952.973971][T14017] CPU: 1 PID: 14017 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 952.983025][T14017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 952.993104][T14017] Call Trace: [ 952.996394][T14017] dump_stack+0x172/0x1f0 [ 953.000722][T14017] should_fail.cold+0xa/0x15 [ 953.005304][T14017] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 953.011102][T14017] ? ___might_sleep+0x163/0x280 [ 953.015952][T14017] __should_failslab+0x121/0x190 [ 953.020988][T14017] should_failslab+0x9/0x14 [ 953.025490][T14017] kmem_cache_alloc+0x2b2/0x6f0 [ 953.030326][T14017] ? find_held_lock+0x35/0x130 [ 953.035080][T14017] ? kernfs_activate+0x192/0x1f0 [ 953.040011][T14017] __kernfs_new_node+0xef/0x690 [ 953.044868][T14017] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 953.050316][T14017] ? retint_kernel+0x2d/0x2d [ 953.054905][T14017] ? trace_hardirqs_on_caller+0x6a/0x220 [ 953.060565][T14017] ? kasan_check_write+0x14/0x20 [ 953.065504][T14017] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 953.071043][T14017] ? wait_for_completion+0x440/0x440 [ 953.076330][T14017] kernfs_new_node+0x99/0x130 [ 953.081003][T14017] __kernfs_create_file+0x51/0x340 [ 953.086126][T14017] sysfs_add_file_mode_ns+0x222/0x560 [ 953.091489][T14017] internal_create_group+0x35b/0xc40 [ 953.096759][T14017] ? bd_set_size+0x89/0xb0 [ 953.101168][T14017] ? remove_files.isra.0+0x190/0x190 [ 953.106469][T14017] sysfs_create_group+0x20/0x30 [ 953.111307][T14017] lo_ioctl+0x10af/0x2150 [ 953.115647][T14017] ? lo_rw_aio+0x1120/0x1120 [ 953.120233][T14017] blkdev_ioctl+0xee8/0x1c40 [ 953.124815][T14017] ? blkpg_ioctl+0xa90/0xa90 [ 953.129393][T14017] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 953.135203][T14017] ? __fget+0x35a/0x550 [ 953.139352][T14017] block_ioctl+0xee/0x130 [ 953.143673][T14017] ? blkdev_fallocate+0x410/0x410 [ 953.148692][T14017] do_vfs_ioctl+0xd6e/0x1390 [ 953.153282][T14017] ? ioctl_preallocate+0x210/0x210 [ 953.158397][T14017] ? __fget+0x381/0x550 [ 953.162587][T14017] ? ksys_dup3+0x3e0/0x3e0 [ 953.166991][T14017] ? do_sys_open+0x31d/0x5d0 [ 953.171576][T14017] ? tomoyo_file_ioctl+0x23/0x30 [ 953.176502][T14017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 953.182730][T14017] ? security_file_ioctl+0x93/0xc0 [ 953.187945][T14017] ksys_ioctl+0xab/0xd0 [ 953.192095][T14017] __x64_sys_ioctl+0x73/0xb0 [ 953.196701][T14017] do_syscall_64+0x103/0x610 [ 953.201307][T14017] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 953.207196][T14017] RIP: 0033:0x457c97 [ 953.211083][T14017] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 953.230683][T14017] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:34:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x37}) 03:34:41 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x48000000}}}}}}}}}, 0x0) [ 953.239090][T14017] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 953.247052][T14017] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 953.255016][T14017] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 953.262984][T14017] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 953.270946][T14017] R13: 0000000000000000 R14: 00000000004dbc78 R15: 0000000000000003 [ 953.322291][T14023] EXT4-fs (sda1): Unrecognized mount option "debog_want_extra_isize=0x0000000000000000" or missing value 03:34:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xb6}) 03:34:42 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x60000000}}}}}}}}}, 0x0) [ 953.515377][T14041] EXT4-fs (sda1): Unrecognized mount option "debog_want_extra_isize=0x0000000000000000" or missing value 03:34:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debpg_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:42 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/attr/current\x00', 0x2, 0x0) r2 = dup2(r1, r0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)=0x6) ioctl$DRM_IOCTL_CONTROL(r2, 0x40086414, &(0x7f0000000200)={0x1, 0x7ff}) socketpair(0x1b, 0x80000, 0x7, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000000c0)=0xffe0000000000000, 0x4) 03:34:42 executing program 5 (fault-call:2 fault-nth:12): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x900}) 03:34:42 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x800e0000}}}}}}}}}, 0x0) 03:34:42 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="2200782e0c76622e7bf714f91e63b48961910bdcf7b5a0d4a10f465949ca5033fdcc05009040e92faf02c297599a1c54baf3b91a27c09325681a7c6fe97d3709e9240fc7e7d47b2bbf80eed494fda83509ab1582073e553931ac3cdac2433e3ae11e45beb07200020000e5399cadde27ffeb0f53"], &(0x7f0000000100)='jfs\x00', 0x4, 0x1) 03:34:42 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x80350000}}}}}}}}}, 0x0) 03:34:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xd00}) [ 953.714597][T14052] FAULT_INJECTION: forcing a failure. [ 953.714597][T14052] name failslab, interval 1, probability 0, space 0, times 0 [ 953.730239][T14052] CPU: 0 PID: 14052 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 953.739270][T14052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 953.749317][T14052] Call Trace: [ 953.752605][T14052] dump_stack+0x172/0x1f0 [ 953.756939][T14052] should_fail.cold+0xa/0x15 [ 953.761560][T14052] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 953.767370][T14052] ? ___might_sleep+0x163/0x280 [ 953.772228][T14052] __should_failslab+0x121/0x190 [ 953.777172][T14052] should_failslab+0x9/0x14 [ 953.781697][T14052] kmem_cache_alloc+0x2b2/0x6f0 [ 953.786539][T14052] ? find_held_lock+0x35/0x130 [ 953.791312][T14052] ? kernfs_activate+0x192/0x1f0 [ 953.796249][T14052] __kernfs_new_node+0xef/0x690 [ 953.801103][T14052] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 953.806556][T14052] ? lock_downgrade+0x880/0x880 [ 953.811404][T14052] ? kasan_check_write+0x14/0x20 [ 953.816333][T14052] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 953.821898][T14052] ? wait_for_completion+0x440/0x440 [ 953.827183][T14052] kernfs_new_node+0x99/0x130 [ 953.831872][T14052] __kernfs_create_file+0x51/0x340 [ 953.836983][T14052] sysfs_add_file_mode_ns+0x222/0x560 [ 953.842451][T14052] internal_create_group+0x35b/0xc40 [ 953.847731][T14052] ? bd_set_size+0x89/0xb0 [ 953.852146][T14052] ? remove_files.isra.0+0x190/0x190 [ 953.857717][T14052] sysfs_create_group+0x20/0x30 [ 953.862566][T14052] lo_ioctl+0x10af/0x2150 [ 953.866901][T14052] ? lo_rw_aio+0x1120/0x1120 [ 953.871494][T14052] blkdev_ioctl+0xee8/0x1c40 [ 953.876102][T14052] ? blkpg_ioctl+0xa90/0xa90 [ 953.880689][T14052] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 953.886498][T14052] ? __fget+0x35a/0x550 [ 953.890665][T14052] block_ioctl+0xee/0x130 [ 953.894983][T14052] ? blkdev_fallocate+0x410/0x410 [ 953.900041][T14052] do_vfs_ioctl+0xd6e/0x1390 [ 953.904733][T14052] ? ioctl_preallocate+0x210/0x210 [ 953.909856][T14052] ? __fget+0x381/0x550 [ 953.914010][T14052] ? ksys_dup3+0x3e0/0x3e0 [ 953.918419][T14052] ? do_sys_open+0x31d/0x5d0 [ 953.923026][T14052] ? tomoyo_file_ioctl+0x23/0x30 [ 953.928045][T14052] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 953.934277][T14052] ? security_file_ioctl+0x93/0xc0 [ 953.939385][T14052] ksys_ioctl+0xab/0xd0 [ 953.943538][T14052] __x64_sys_ioctl+0x73/0xb0 [ 953.948145][T14052] do_syscall_64+0x103/0x610 [ 953.952734][T14052] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 953.958735][T14052] RIP: 0033:0x457c97 [ 953.962623][T14052] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 953.982228][T14052] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 953.990634][T14052] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 953.998613][T14052] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 954.006586][T14052] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 954.014546][T14052] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 954.022513][T14052] R13: 0000000000000000 R14: 00000000004dbc78 R15: 0000000000000003 03:34:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x1470}) 03:34:42 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x81000000}}}}}}}}}, 0x0) [ 954.072517][T14058] EXT4-fs (sda1): Unrecognized mount option "debpg_want_extra_isize=0x0000000000000000" or missing value 03:34:42 executing program 0: r0 = request_key(&(0x7f0000000040)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='jfs\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000140)='big_key\x00', &(0x7f0000000180)=@secondary='builtin_and_secondary_trusted\x00') syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x60, 0x0, 0x0, 0x6, 0x0) 03:34:42 executing program 5 (fault-call:2 fault-nth:13): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) [ 954.212645][T14074] EXT4-fs (sda1): Unrecognized mount option "debpg_want_extra_isize=0x0000000000000000" or missing value [ 954.307695][T14082] FAULT_INJECTION: forcing a failure. [ 954.307695][T14082] name failslab, interval 1, probability 0, space 0, times 0 [ 954.335855][T14082] CPU: 1 PID: 14082 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 954.344976][T14082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 954.355202][T14082] Call Trace: [ 954.358494][T14082] dump_stack+0x172/0x1f0 [ 954.362819][T14082] should_fail.cold+0xa/0x15 [ 954.367397][T14082] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 954.373193][T14082] ? ___might_sleep+0x163/0x280 [ 954.378136][T14082] __should_failslab+0x121/0x190 [ 954.383117][T14082] should_failslab+0x9/0x14 [ 954.387617][T14082] kmem_cache_alloc+0x2b2/0x6f0 [ 954.392560][T14082] ? lock_downgrade+0x880/0x880 [ 954.397396][T14082] ? kasan_check_read+0x11/0x20 [ 954.402361][T14082] __kernfs_new_node+0xef/0x690 [ 954.407202][T14082] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 954.412657][T14082] ? wait_for_completion+0x440/0x440 [ 954.417937][T14082] ? mutex_unlock+0xd/0x10 [ 954.422358][T14082] ? kernfs_activate+0x192/0x1f0 [ 954.427290][T14082] kernfs_new_node+0x99/0x130 [ 954.431962][T14082] __kernfs_create_file+0x51/0x340 [ 954.437067][T14082] sysfs_add_file_mode_ns+0x222/0x560 [ 954.442442][T14082] internal_create_group+0x35b/0xc40 [ 954.447821][T14082] ? bd_set_size+0x89/0xb0 [ 954.452233][T14082] ? remove_files.isra.0+0x190/0x190 [ 954.457607][T14082] sysfs_create_group+0x20/0x30 [ 954.462470][T14082] lo_ioctl+0x10af/0x2150 [ 954.466799][T14082] ? lo_rw_aio+0x1120/0x1120 [ 954.471389][T14082] blkdev_ioctl+0xee8/0x1c40 [ 954.475986][T14082] ? blkpg_ioctl+0xa90/0xa90 [ 954.480573][T14082] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 954.486386][T14082] ? __fget+0x35a/0x550 [ 954.490543][T14082] block_ioctl+0xee/0x130 [ 954.494868][T14082] ? blkdev_fallocate+0x410/0x410 [ 954.499893][T14082] do_vfs_ioctl+0xd6e/0x1390 [ 954.504484][T14082] ? ioctl_preallocate+0x210/0x210 [ 954.509707][T14082] ? __fget+0x381/0x550 [ 954.513974][T14082] ? ksys_dup3+0x3e0/0x3e0 [ 954.518396][T14082] ? do_sys_open+0x31d/0x5d0 [ 954.522981][T14082] ? tomoyo_file_ioctl+0x23/0x30 [ 954.527916][T14082] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 954.534160][T14082] ? security_file_ioctl+0x93/0xc0 [ 954.539266][T14082] ksys_ioctl+0xab/0xd0 [ 954.543417][T14082] __x64_sys_ioctl+0x73/0xb0 [ 954.548005][T14082] do_syscall_64+0x103/0x610 [ 954.552592][T14082] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 954.558487][T14082] RIP: 0033:0x457c97 [ 954.562377][T14082] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 954.581970][T14082] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 954.590370][T14082] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 954.598331][T14082] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 03:34:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debsg_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:43 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x86ddffff}}}}}}}}}, 0x0) 03:34:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x1b00}) [ 954.606294][T14082] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 954.614253][T14082] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 954.622303][T14082] R13: 0000000000000000 R14: 00000000004dbc78 R15: 0000000000000003 03:34:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x1d00}) 03:34:43 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x88470000}}}}}}}}}, 0x0) 03:34:43 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) write$FUSE_LSEEK(r0, &(0x7f00000000c0)={0x18, 0x0, 0x4, {0x1}}, 0x18) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:34:43 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x88480000}}}}}}}}}, 0x0) 03:34:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x2000}) 03:34:43 executing program 5 (fault-call:2 fault-nth:14): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:43 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x88640000}}}}}}}}}, 0x0) [ 954.988696][T14098] EXT4-fs (sda1): Unrecognized mount option "debsg_want_extra_isize=0x0000000000000000" or missing value 03:34:43 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x3, 0x4000) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000000c0)) 03:34:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x3700}) [ 955.189269][T14113] FAULT_INJECTION: forcing a failure. [ 955.189269][T14113] name failslab, interval 1, probability 0, space 0, times 0 [ 955.208703][T14113] CPU: 1 PID: 14113 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 955.217807][T14113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 955.227953][T14113] Call Trace: [ 955.231250][T14113] dump_stack+0x172/0x1f0 [ 955.235592][T14113] should_fail.cold+0xa/0x15 [ 955.240191][T14113] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 955.245991][T14113] ? ___might_sleep+0x163/0x280 [ 955.250837][T14113] __should_failslab+0x121/0x190 [ 955.255763][T14113] should_failslab+0x9/0x14 [ 955.260344][T14113] kmem_cache_alloc+0x2b2/0x6f0 [ 955.265187][T14113] ? lock_downgrade+0x880/0x880 [ 955.270040][T14113] ? kasan_check_read+0x11/0x20 [ 955.274912][T14113] __kernfs_new_node+0xef/0x690 [ 955.279775][T14113] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 955.285229][T14113] ? wait_for_completion+0x440/0x440 [ 955.290512][T14113] ? mutex_unlock+0xd/0x10 [ 955.294934][T14113] ? kernfs_activate+0x192/0x1f0 [ 955.299868][T14113] kernfs_new_node+0x99/0x130 [ 955.304542][T14113] __kernfs_create_file+0x51/0x340 [ 955.309644][T14113] sysfs_add_file_mode_ns+0x222/0x560 [ 955.315019][T14113] internal_create_group+0x35b/0xc40 [ 955.320290][T14113] ? bd_set_size+0x89/0xb0 [ 955.324713][T14113] ? remove_files.isra.0+0x190/0x190 [ 955.330007][T14113] sysfs_create_group+0x20/0x30 [ 955.334855][T14113] lo_ioctl+0x10af/0x2150 [ 955.339269][T14113] ? lo_rw_aio+0x1120/0x1120 [ 955.343964][T14113] blkdev_ioctl+0xee8/0x1c40 [ 955.348570][T14113] ? blkpg_ioctl+0xa90/0xa90 [ 955.353260][T14113] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 955.359079][T14113] ? __fget+0x35a/0x550 [ 955.363234][T14113] block_ioctl+0xee/0x130 [ 955.367562][T14113] ? blkdev_fallocate+0x410/0x410 [ 955.372583][T14113] do_vfs_ioctl+0xd6e/0x1390 [ 955.377180][T14113] ? ioctl_preallocate+0x210/0x210 [ 955.382298][T14113] ? __fget+0x381/0x550 [ 955.386456][T14113] ? ksys_dup3+0x3e0/0x3e0 [ 955.391041][T14113] ? do_sys_open+0x31d/0x5d0 [ 955.395634][T14113] ? tomoyo_file_ioctl+0x23/0x30 [ 955.400580][T14113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 955.406834][T14113] ? security_file_ioctl+0x93/0xc0 [ 955.411954][T14113] ksys_ioctl+0xab/0xd0 [ 955.416115][T14113] __x64_sys_ioctl+0x73/0xb0 [ 955.420701][T14113] do_syscall_64+0x103/0x610 [ 955.425289][T14113] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 955.431168][T14113] RIP: 0033:0x457c97 [ 955.435057][T14113] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 955.454654][T14113] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 955.463058][T14113] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 955.471022][T14113] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 955.478995][T14113] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 955.486961][T14113] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 955.494922][T14113] R13: 0000000000000000 R14: 00000000004dbc78 R15: 0000000000000003 [ 955.562048][T14126] EXT4-fs (sda1): Unrecognized mount option "debsg_want_extra_isize=0x0000000000000000" or missing value 03:34:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debxg_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:44 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x88a8ffff}}}}}}}}}, 0x0) 03:34:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x3f00}) 03:34:44 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in6=@ipv4={[], [], @remote}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0xa, &(0x7f00000006c0)=[{&(0x7f0000000100)="f0d156a4d8a51e7f2586fc2846425ae7b3e4c56940b7d79ac889e2bebe9a735896ef865ec19a6d94f54a1f95b17a67f276035f66ac808606c987efd8502adff77d3f50536c9796ee41fc06f1ce9a4358cf112cd78f2363a0a7", 0x59, 0x8000}, {&(0x7f0000000180)="fd21e1221dae2fb85e9d79ba6dc37b885741cc4c9fa0e9766d04f3a35adeae3d4cd1e3de8de43f2d4cc992e2669495b9f01ddc8226c14dba3d93f39cde07fecda0d7f92f2f6d266a8f03f8db34ffe0e58affd7c500b94b934af39fd5cfba2a9f2cda37ae5289282b4b2f5336a208fc32d2da5c3303d1370f09a4da3ed2047907c7295344", 0x84, 0x7}, {&(0x7f0000000240)="c0be1f52703b294867b61ace", 0xc}, {&(0x7f0000000280)="3c357b61723da9067061cd8e0faf95abb77884bc6462291f154903ded150480c26ca87b4898180cd2991a82b840174668aebf071879ea981c4950fe5245c44e3113ecdd8aef37ea1bcf4d0bf79465ea9449f41c6dd37a2b5e0dc761d3b80072826e13bf9abcfb898123c1d4e1eb2d8cd410ae27df04af2836f66b996e86580fd8c6f19104ae5f6f150ad9ba76d7e17b5cc86bc167613e23e5a3ee1a79a0dde03ce60b0c75f04fef886a2c8a14a0f932711920ad4f60ea326be4860763b415fc995600afaa4cd4dbd623d8d512bd169bf212f872fe3bb", 0xd6, 0x7}, {&(0x7f0000000380)="dcbbc196680eecc538bc121c181911b461f89c7f76dbd9ac93cdb88fc5b04c7e4d3e36cd1018f898e00a8e9635acb47b115751e98e75d7d20c3af297ac560fe5a02a420e43dbebe74a384781931f41d85fa9f72458c7f59b9cc26d23596400d57fb7bf88de54d40478baca86216ebe0a4797200fc591b3c1b9281d589e5a95", 0x7f, 0xfffffffffffffffe}, {&(0x7f0000000400)="4502bd9ede261fd104ee65cc916699139473589b57d0d691a6b4a25f2b02a55011e594111920e020885e69df6338efa016136de5caa1d87b9febbe6808381e5305b710e82f28d92500691f0adb5e831467078104c6f4c4185375939149f3b4", 0x5f, 0x7f}, {&(0x7f0000000480)="39b6cab60a62acaa9a8d43bac255e0e82fda0eb691040e141422e83adc70b675e71595abde73eb34ad12f2f9a610b4f719b22e987379a50b47d2fe5dbb87a1e54b5e33c835a5d519b1e3745582360b7c6ea5b1832c203cc760fa378522ebe3f818e2d2fd1c6a77dfbc1f5941ec5bd2f14552677121789d6bbb61dbf0592f1a221f27eff2e8d1460aefd2646cd762c0e2e6fb1dd3558b2603f06ac0997e252c6945ae14cf2dd2daa8c26f21d2e8e105f1214dfb8b97181b22951440812d00fc5b931b1b2c4a1c742cefbb6659a729", 0xce, 0x1}, {&(0x7f0000000580)="31119e9495b529d99a6051c1fe9402074afffb8aa76df1c5a64514a60792", 0x1e, 0x20}, {&(0x7f00000005c0)="41e342e2cb2c42d59c2b70a47274a936687cceea34bab356262472f78f907f94685efd4e67478fdb3d4d1a8428f7604279be175082c618640c8f3a4a39ac0a789c6eb2fe06acda402b7e4d9c1aebf8bca51cfedc26ab27c829409f7ae6fea0d6920f87364dd765d2b2b35020834e0e1559303e62d5d3a369652b573c177931765a056d86533eeee6e8fc5149ff891a6ab6097c", 0x93, 0x3}, {&(0x7f0000000680)="c9", 0x1, 0x7f}], 0x809, &(0x7f00000009c0)=ANY=[@ANYBLOB='discard=0x000000007fffffff,fscontext=sysadm_u,smackfsroot=jfs\x00,uid=', @ANYRESDEC=r0, @ANYBLOB="2c6d61736b3d4d41595f57524954452c6f626a5f757365723d6a6673003c6f626a5f726f6c653d296b657972696e672c00b20dc7343079bbd8b3"]) 03:34:44 executing program 5 (fault-call:2 fault-nth:15): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:44 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0x0, 0x0, 0x40000000000, 0x0) 03:34:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x4000}) 03:34:44 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x88caffff}}}}}}}}}, 0x0) 03:34:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x7014}) 03:34:44 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x89060000}}}}}}}}}, 0x0) [ 955.885429][T14139] EXT4-fs (sda1): Unrecognized mount option "debxg_want_extra_isize=0x0000000000000000" or missing value [ 955.908113][T14144] FAULT_INJECTION: forcing a failure. [ 955.908113][T14144] name failslab, interval 1, probability 0, space 0, times 0 [ 955.932186][T14144] CPU: 0 PID: 14144 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 955.941231][T14144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 955.951458][T14144] Call Trace: [ 955.954757][T14144] dump_stack+0x172/0x1f0 [ 955.959196][T14144] should_fail.cold+0xa/0x15 [ 955.963796][T14144] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 955.969614][T14144] ? ___might_sleep+0x163/0x280 [ 955.974463][T14144] __should_failslab+0x121/0x190 [ 955.979396][T14144] should_failslab+0x9/0x14 [ 955.983887][T14144] kmem_cache_alloc+0x2b2/0x6f0 [ 955.988729][T14144] ? lock_downgrade+0x880/0x880 [ 955.993571][T14144] ? kasan_check_read+0x11/0x20 [ 955.998433][T14144] __kernfs_new_node+0xef/0x690 [ 956.003277][T14144] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 956.008734][T14144] ? wait_for_completion+0x440/0x440 [ 956.014032][T14144] ? mutex_unlock+0xd/0x10 [ 956.018443][T14144] ? kernfs_activate+0x192/0x1f0 [ 956.023379][T14144] kernfs_new_node+0x99/0x130 [ 956.028062][T14144] __kernfs_create_file+0x51/0x340 [ 956.033169][T14144] sysfs_add_file_mode_ns+0x222/0x560 [ 956.038540][T14144] internal_create_group+0x35b/0xc40 [ 956.043827][T14144] ? bd_set_size+0x89/0xb0 [ 956.048242][T14144] ? remove_files.isra.0+0x190/0x190 [ 956.053527][T14144] sysfs_create_group+0x20/0x30 [ 956.058375][T14144] lo_ioctl+0x10af/0x2150 [ 956.062702][T14144] ? lo_rw_aio+0x1120/0x1120 [ 956.067307][T14144] blkdev_ioctl+0xee8/0x1c40 [ 956.072019][T14144] ? blkpg_ioctl+0xa90/0xa90 [ 956.076608][T14144] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 956.082417][T14144] ? __fget+0x35a/0x550 [ 956.086566][T14144] block_ioctl+0xee/0x130 [ 956.090903][T14144] ? blkdev_fallocate+0x410/0x410 [ 956.095923][T14144] do_vfs_ioctl+0xd6e/0x1390 [ 956.100521][T14144] ? ioctl_preallocate+0x210/0x210 [ 956.105622][T14144] ? __fget+0x381/0x550 [ 956.109779][T14144] ? ksys_dup3+0x3e0/0x3e0 [ 956.114186][T14144] ? do_sys_open+0x31d/0x5d0 [ 956.118772][T14144] ? tomoyo_file_ioctl+0x23/0x30 [ 956.123706][T14144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 956.129937][T14144] ? security_file_ioctl+0x93/0xc0 [ 956.135037][T14144] ksys_ioctl+0xab/0xd0 [ 956.139191][T14144] __x64_sys_ioctl+0x73/0xb0 [ 956.143791][T14144] do_syscall_64+0x103/0x610 [ 956.148387][T14144] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 956.154287][T14144] RIP: 0033:0x457c97 [ 956.158180][T14144] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 956.177993][T14144] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 956.186496][T14144] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 956.194475][T14144] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 956.202435][T14144] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 956.210403][T14144] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 956.218369][T14144] R13: 0000000000000000 R14: 00000000004dbc78 R15: 0000000000000003 03:34:44 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0xffffa888}}}}}}}}}, 0x0) 03:34:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xb600}) [ 956.295604][T14138] jfs: Unrecognized mount option "fscontext=sysadm_u" or missing value [ 956.432314][T14161] EXT4-fs (sda1): Unrecognized mount option "debxg_want_extra_isize=0x0000000000000000" or missing value 03:34:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'deb\x8eg_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:45 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0xffffca88}}}}}}}}}, 0x0) 03:34:45 executing program 5 (fault-call:2 fault-nth:16): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) [ 956.606223][T14168] FAULT_INJECTION: forcing a failure. [ 956.606223][T14168] name failslab, interval 1, probability 0, space 0, times 0 [ 956.621141][T14168] CPU: 0 PID: 14168 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 956.630162][T14168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 956.640205][T14168] Call Trace: [ 956.643488][T14168] dump_stack+0x172/0x1f0 [ 956.647831][T14168] should_fail.cold+0xa/0x15 [ 956.652417][T14168] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 956.658216][T14168] ? ___might_sleep+0x163/0x280 [ 956.663063][T14168] __should_failslab+0x121/0x190 [ 956.667991][T14168] should_failslab+0x9/0x14 [ 956.672490][T14168] kmem_cache_alloc+0x2b2/0x6f0 [ 956.677343][T14168] ? lock_downgrade+0x880/0x880 [ 956.682199][T14168] ? kasan_check_read+0x11/0x20 [ 956.687055][T14168] __kernfs_new_node+0xef/0x690 [ 956.692450][T14168] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 956.697905][T14168] ? wait_for_completion+0x440/0x440 [ 956.703188][T14168] ? mutex_unlock+0xd/0x10 [ 956.707599][T14168] ? kernfs_activate+0x192/0x1f0 [ 956.712532][T14168] kernfs_new_node+0x99/0x130 [ 956.717211][T14168] __kernfs_create_file+0x51/0x340 [ 956.722315][T14168] sysfs_add_file_mode_ns+0x222/0x560 [ 956.727685][T14168] internal_create_group+0x35b/0xc40 [ 956.732969][T14168] ? bd_set_size+0x89/0xb0 [ 956.737385][T14168] ? remove_files.isra.0+0x190/0x190 [ 956.742675][T14168] sysfs_create_group+0x20/0x30 [ 956.747523][T14168] lo_ioctl+0x10af/0x2150 [ 956.751938][T14168] ? lo_rw_aio+0x1120/0x1120 [ 956.756612][T14168] blkdev_ioctl+0xee8/0x1c40 [ 956.761193][T14168] ? blkpg_ioctl+0xa90/0xa90 [ 956.765777][T14168] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 956.771607][T14168] ? __fget+0x35a/0x550 [ 956.775918][T14168] block_ioctl+0xee/0x130 [ 956.780238][T14168] ? blkdev_fallocate+0x410/0x410 [ 956.785256][T14168] do_vfs_ioctl+0xd6e/0x1390 [ 956.789835][T14168] ? ioctl_preallocate+0x210/0x210 [ 956.794936][T14168] ? __fget+0x381/0x550 [ 956.799087][T14168] ? ksys_dup3+0x3e0/0x3e0 [ 956.803499][T14168] ? do_sys_open+0x31d/0x5d0 [ 956.808090][T14168] ? tomoyo_file_ioctl+0x23/0x30 [ 956.813016][T14168] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 956.819249][T14168] ? security_file_ioctl+0x93/0xc0 [ 956.824474][T14168] ksys_ioctl+0xab/0xd0 [ 956.828625][T14168] __x64_sys_ioctl+0x73/0xb0 [ 956.833210][T14168] do_syscall_64+0x103/0x610 [ 956.837799][T14168] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 956.843683][T14168] RIP: 0033:0x457c97 [ 956.847579][T14168] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 956.867168][T14168] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 956.875577][T14168] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 956.883535][T14168] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 956.891500][T14168] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 956.899456][T14168] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 03:34:45 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4000, 0x0) setns(r0, 0x20000) 03:34:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xd0000}) 03:34:45 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f00000000c0)={0x4, 0x3}) 03:34:45 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0xffffdd86}}}}}}}}}, 0x0) [ 956.907416][T14168] R13: 0000000000000000 R14: 00000000004dbc78 R15: 0000000000000003 03:34:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x100000}) 03:34:45 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffff000}}}}}}}}}, 0x0) 03:34:45 executing program 5 (fault-call:2 fault-nth:17): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x200000}) 03:34:45 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0xf0ffffffffffff}}}}}}}}}, 0x0) 03:34:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debu\n_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x1000000}) 03:34:45 executing program 0: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffff7ffffd, 0x27, 0x0, 0x0, 0x0) 03:34:45 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x10000) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) [ 957.271786][T14193] FAULT_INJECTION: forcing a failure. [ 957.271786][T14193] name failslab, interval 1, probability 0, space 0, times 0 [ 957.310157][T14193] CPU: 0 PID: 14193 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 957.319301][T14193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 957.329345][T14193] Call Trace: [ 957.332628][T14193] dump_stack+0x172/0x1f0 [ 957.337040][T14193] should_fail.cold+0xa/0x15 [ 957.341621][T14193] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 957.347418][T14193] ? ___might_sleep+0x163/0x280 [ 957.352279][T14193] __should_failslab+0x121/0x190 [ 957.357222][T14193] should_failslab+0x9/0x14 [ 957.361715][T14193] kmem_cache_alloc_trace+0x2d1/0x760 [ 957.367086][T14193] kobject_uevent_env+0x2fb/0x1030 [ 957.372213][T14193] kobject_uevent+0x20/0x26 [ 957.376714][T14193] lo_ioctl+0x112b/0x2150 [ 957.381036][T14193] ? lo_rw_aio+0x1120/0x1120 [ 957.385619][T14193] blkdev_ioctl+0xee8/0x1c40 [ 957.390198][T14193] ? blkpg_ioctl+0xa90/0xa90 [ 957.394797][T14193] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 957.400609][T14193] ? __fget+0x35a/0x550 [ 957.404766][T14193] block_ioctl+0xee/0x130 [ 957.409084][T14193] ? blkdev_fallocate+0x410/0x410 [ 957.414115][T14193] do_vfs_ioctl+0xd6e/0x1390 [ 957.418706][T14193] ? ioctl_preallocate+0x210/0x210 [ 957.423810][T14193] ? __fget+0x381/0x550 [ 957.427981][T14193] ? ksys_dup3+0x3e0/0x3e0 [ 957.432404][T14193] ? do_sys_open+0x31d/0x5d0 [ 957.436995][T14193] ? tomoyo_file_ioctl+0x23/0x30 [ 957.442004][T14193] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 957.448235][T14193] ? security_file_ioctl+0x93/0xc0 [ 957.453341][T14193] ksys_ioctl+0xab/0xd0 [ 957.457495][T14193] __x64_sys_ioctl+0x73/0xb0 [ 957.462086][T14193] do_syscall_64+0x103/0x610 [ 957.466671][T14193] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 957.472577][T14193] RIP: 0033:0x457c97 [ 957.476464][T14193] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 957.496144][T14193] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 957.504559][T14193] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 957.512522][T14193] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 957.520502][T14193] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 957.528480][T14193] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 957.536449][T14193] R13: 0000000000000000 R14: 00000000004dbc78 R15: 0000000000000003 03:34:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x2000000}) 03:34:46 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x100000000000000}}}}}}}}}, 0x0) [ 957.627414][T14203] EXT4-fs: 1 callbacks suppressed [ 957.627424][T14203] EXT4-fs (sda1): Unrecognized mount option "debu [ 957.627424][T14203] _want_extra_isize=0x0000000000000000" or missing value 03:34:46 executing program 5 (fault-call:2 fault-nth:18): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:46 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x7, 0x802) mq_notify(r0, &(0x7f0000000200)={0x0, 0x32, 0x3, @thr={&(0x7f00000000c0)="632c73f7b7115b8df6d6c0c864436b88ea850fa526776a7f81dc5060054f0a73d8860efd863981d7625f8e08981cfde7d6f257efc8f6a3269361d81a7ac15f4fe231ad0085e1a6c079279e93c3f447b07f4328cd4df3dd6d0d8e89e87ae04c3da3ff39f96930b73c669781caca189a47db93f5b420f9c93cc37451a9e14a08165d503bf8cd0d6ae743dc67b4d43d18563133f49e7627d0a8e0b4faf56cb5201a2e2d1dd69898fd966c3cc8a8bf00e2bde8f860720804b29bd6", &(0x7f0000000180)="6b3df1612dec5c4e1a248b18b848a0b45a1fc0254fe495929a9bcd27b7e213572bc7a92aa536b06689204ce8bd0a1abe86c2f14ef2b4af435231b76fd94fa48418456b175639c3931ff2474788569ecd7aca86bd22c12ac15effa036ca43f145f05ba3ad01a89d6028ec90ce8b"}}) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f00000002c0)) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x439) 03:34:46 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x200000000000000}}}}}}}}}, 0x0) [ 957.737764][T14218] EXT4-fs (sda1): Unrecognized mount option "debu [ 957.737764][T14218] _want_extra_isize=0x0000000000000000" or missing value 03:34:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x4000000}) [ 957.876291][T14225] FAULT_INJECTION: forcing a failure. [ 957.876291][T14225] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 957.889737][T14225] CPU: 0 PID: 14225 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 957.898832][T14225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 957.909008][T14225] Call Trace: [ 957.912299][T14225] dump_stack+0x172/0x1f0 [ 957.916633][T14225] should_fail.cold+0xa/0x15 [ 957.921219][T14225] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 957.927055][T14225] ? __lock_acquire+0x548/0x3fb0 [ 957.932083][T14225] ? trace_hardirqs_on+0x67/0x230 [ 957.937101][T14225] should_fail_alloc_page+0x50/0x60 [ 957.942290][T14225] __alloc_pages_nodemask+0x1a1/0x7e0 [ 957.947786][T14225] ? __alloc_pages_slowpath+0x2900/0x2900 [ 957.953535][T14225] ? find_held_lock+0x35/0x130 [ 957.958309][T14225] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 957.964117][T14225] cache_grow_begin+0x9c/0x860 [ 957.968962][T14225] ? kobject_uevent_env+0x2fb/0x1030 03:34:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debu\x8e_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) [ 957.974237][T14225] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 957.980474][T14225] kmem_cache_alloc_trace+0x67f/0x760 [ 957.985849][T14225] kobject_uevent_env+0x2fb/0x1030 [ 957.990958][T14225] kobject_uevent+0x20/0x26 [ 957.995450][T14225] lo_ioctl+0x112b/0x2150 [ 957.999772][T14225] ? lo_rw_aio+0x1120/0x1120 [ 958.004361][T14225] blkdev_ioctl+0xee8/0x1c40 [ 958.008956][T14225] ? blkpg_ioctl+0xa90/0xa90 [ 958.013557][T14225] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 958.019369][T14225] ? __fget+0x35a/0x550 03:34:46 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x800000000000000}}}}}}}}}, 0x0) 03:34:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x9000000}) [ 958.023544][T14225] block_ioctl+0xee/0x130 [ 958.027863][T14225] ? blkdev_fallocate+0x410/0x410 [ 958.032890][T14225] do_vfs_ioctl+0xd6e/0x1390 [ 958.037487][T14225] ? ioctl_preallocate+0x210/0x210 [ 958.042612][T14225] ? __fget+0x381/0x550 [ 958.046771][T14225] ? ksys_dup3+0x3e0/0x3e0 [ 958.051184][T14225] ? do_sys_open+0x31d/0x5d0 [ 958.055786][T14225] ? tomoyo_file_ioctl+0x23/0x30 [ 958.060808][T14225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 958.067042][T14225] ? security_file_ioctl+0x93/0xc0 [ 958.072149][T14225] ksys_ioctl+0xab/0xd0 [ 958.076300][T14225] __x64_sys_ioctl+0x73/0xb0 [ 958.080891][T14225] do_syscall_64+0x103/0x610 [ 958.085477][T14225] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 958.091365][T14225] RIP: 0033:0x457c97 [ 958.095253][T14225] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 958.114867][T14225] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 958.123289][T14225] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 958.131252][T14225] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 958.139207][T14225] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 958.147164][T14225] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 958.155122][T14225] R13: 0000000000000000 R14: 00000000004dbc78 R15: 0000000000000003 03:34:46 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getresuid(&(0x7f0000000480)=0x0, &(0x7f00000004c0), &(0x7f0000000500)=0x0) pipe2(&(0x7f0000000540)={0xffffffffffffffff}, 0x0) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r2, &(0x7f0000000740)={0x90, 0x0, 0x8, {0x1, 0x0, 0x2, 0x0, 0xb3, 0x9, {0x6, 0x193, 0x7fff, 0x270, 0x5, 0xc455, 0xaa6, 0x7, 0x438, 0x5, 0x1, r1, r3, 0x7e91, 0x4}}}, 0x90) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0xeaf5, 0x4, &(0x7f0000000400)=[{&(0x7f0000000100)="2725cfa8d977b0b3e6f1db179db771f4ee9b58fda5c8f190238caa896828eed507944680ce15e4a4ccfb279af049856025d01845b5219b28badb5b2e686e4ae3bb40df44234dbb0b5b80a78b15e4af7af32289b88face151b70a058862252b2df657f9ea06f7a245abea839fc6bc98abe4787122632e3050d063a23877956876b0351921bcd6123386c4ffd218080cedcfc2a23eb3e716095dc0a0d7d01625b7e5b49eb86c8f50d2e6a745b1ad3496a139602afd80a308877d1bdf21d6e3548e2add751ffe00027fda79df9445dc55f0a29afc9f78fe4d51bb", 0xd9, 0x3}, {&(0x7f0000000200)="ca63ec44ba4b5c162ef808f9f73f4d2f3a52cf73f317dce43a164f47f82abc05a28af0ec4ca93556cba540f21c17a8c91f6a1603a5a5e7054327db0bc7a079094d88b89bb898830bb7e320cff283a55dbf85cc506af324ab8ca077aaa12f9ebe91d10df207f85fd509d8201adfdaaa20ea5a2618d7d02ce20a468ffb20f9c7da6727f209496322b71727322403e608cc87b9083c34b8ff060cdf0b82f9354828d6a3f95ff7f82bd885d90eb80ebfbf49a6860db0cc44aac5", 0xb8, 0xfffffffffffff2d6}, {&(0x7f00000002c0)="553cd8f15b6a97bcc401e1ec9daff9aebd8c0e9e55490ff0c61562bdf833443d21b2207214db7c9a08e35a41d9b684e6d3807e0fc38eefafb4d215a40fbcd88bdc3379969052a818925b2d9af5a2ebce83941d3a66c9c4fea944b650324a298a9165d07fd879e0e1398321e30c3f89e8222d3e07b545f744d71ab43636526f9fad8c0c1af51d1753451fbb2791c7892988b2757d", 0x94, 0x5}, {&(0x7f0000000380)="a62317c7306c2e88156b1338ffe0abf561c4890b7e78b119572f7c2ba8f4714db4d145ba02ff8f888413d3e65e2db292edb676bf2497d13af34543c1b09b4df1bb0f61ce39d7", 0x46, 0x7}], 0x82400, &(0x7f0000000600)=ANY=[@ANYBLOB='iocharset=cp862,nodiscard,resize=0x0000000000000008,usrquota,fowner<', @ANYRESDEC=r0, @ANYBLOB="2c006dba2624011d2aa965701f1fea2c0fe3f5a9e4b5b42f534a40cdafb783ad0da270a466a050e27042787eb4129d4cd1f10ed0a5a3a993b195878ec2c7bcde0274d25e163ec4"]) 03:34:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xd000000}) 03:34:46 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x806000000000000}}}}}}}}}, 0x0) 03:34:47 executing program 5 (fault-call:2 fault-nth:19): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:47 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x400000, 0x0) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000100)=r1) 03:34:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x1b000000}) [ 958.474967][T14248] EXT4-fs (sda1): Unrecognized mount option "debuŽ_want_extra_isize=0x0000000000000000" or missing value 03:34:47 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0xd00000000000000}}}}}}}}}, 0x0) [ 958.559172][T14257] FAULT_INJECTION: forcing a failure. [ 958.559172][T14257] name failslab, interval 1, probability 0, space 0, times 0 [ 958.578956][T14257] CPU: 0 PID: 14257 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 958.588097][T14257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 958.598137][T14257] Call Trace: [ 958.601559][T14257] dump_stack+0x172/0x1f0 [ 958.606666][T14257] should_fail.cold+0xa/0x15 [ 958.611256][T14257] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 958.617157][T14257] ? ___might_sleep+0x163/0x280 [ 958.622008][T14257] __should_failslab+0x121/0x190 [ 958.626953][T14257] should_failslab+0x9/0x14 [ 958.631446][T14257] kmem_cache_alloc_node+0x264/0x710 [ 958.636740][T14257] ? find_held_lock+0x35/0x130 [ 958.641518][T14257] __alloc_skb+0xd5/0x5e0 [ 958.645846][T14257] ? skb_trim+0x190/0x190 [ 958.650174][T14257] ? kasan_check_read+0x11/0x20 [ 958.655027][T14257] alloc_uevent_skb+0x83/0x1e2 [ 958.659791][T14257] kobject_uevent_env+0xa63/0x1030 [ 958.664910][T14257] kobject_uevent+0x20/0x26 [ 958.669408][T14257] lo_ioctl+0x112b/0x2150 [ 958.673741][T14257] ? lo_rw_aio+0x1120/0x1120 [ 958.678329][T14257] blkdev_ioctl+0xee8/0x1c40 [ 958.682918][T14257] ? blkpg_ioctl+0xa90/0xa90 [ 958.687520][T14257] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 958.693840][T14257] ? __fget+0x35a/0x550 [ 958.697999][T14257] block_ioctl+0xee/0x130 [ 958.702323][T14257] ? blkdev_fallocate+0x410/0x410 [ 958.707348][T14257] do_vfs_ioctl+0xd6e/0x1390 [ 958.711940][T14257] ? ioctl_preallocate+0x210/0x210 [ 958.717049][T14257] ? __fget+0x381/0x550 [ 958.721207][T14257] ? ksys_dup3+0x3e0/0x3e0 [ 958.725623][T14257] ? do_sys_open+0x31d/0x5d0 [ 958.730220][T14257] ? tomoyo_file_ioctl+0x23/0x30 [ 958.735156][T14257] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 958.741395][T14257] ? security_file_ioctl+0x93/0xc0 [ 958.746519][T14257] ksys_ioctl+0xab/0xd0 [ 958.750676][T14257] __x64_sys_ioctl+0x73/0xb0 [ 958.755265][T14257] do_syscall_64+0x103/0x610 [ 958.759874][T14257] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 958.765760][T14257] RIP: 0033:0x457c97 [ 958.769656][T14257] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 958.789535][T14257] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 958.797948][T14257] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 958.805917][T14257] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 958.813899][T14257] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 958.821864][T14257] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 958.829838][T14257] R13: 0000000000000000 R14: 00000000004dbc78 R15: 0000000000000003 03:34:47 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2000000000000000}}}}}}}}}, 0x0) 03:34:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x1d000000}) [ 958.977629][T14270] EXT4-fs (sda1): Unrecognized mount option "debuŽ_want_extra_isize=0x0000000000000000" or missing value 03:34:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug\nwant_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:47 executing program 5 (fault-call:2 fault-nth:20): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x200000c8}) 03:34:47 executing program 2: unlink(&(0x7f0000000000)='./file0/file0\x00') syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:34:47 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2800000000000000}}}}}}}}}, 0x0) 03:34:47 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8, 0x62081) getsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000040), &(0x7f0000000080)=0x4) epoll_create1(0x80000) 03:34:47 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3000000000000000}}}}}}}}}, 0x0) 03:34:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x37000000}) [ 959.256643][T14281] FAULT_INJECTION: forcing a failure. [ 959.256643][T14281] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 959.270021][T14281] CPU: 1 PID: 14281 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 959.279025][T14281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 959.289064][T14281] Call Trace: [ 959.292332][T14281] dump_stack+0x172/0x1f0 [ 959.296642][T14281] should_fail.cold+0xa/0x15 [ 959.301210][T14281] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 959.307009][T14281] ? __lock_acquire+0x548/0x3fb0 [ 959.311930][T14281] ? trace_hardirqs_on+0x67/0x230 [ 959.316933][T14281] should_fail_alloc_page+0x50/0x60 [ 959.322104][T14281] __alloc_pages_nodemask+0x1a1/0x7e0 [ 959.327462][T14281] ? __alloc_pages_slowpath+0x2900/0x2900 [ 959.333169][T14281] ? find_held_lock+0x35/0x130 [ 959.337912][T14281] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 959.343699][T14281] cache_grow_begin+0x9c/0x860 [ 959.348477][T14281] ? kobject_uevent_env+0x2fb/0x1030 [ 959.353742][T14281] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 959.359962][T14281] kmem_cache_alloc_trace+0x67f/0x760 [ 959.365321][T14281] kobject_uevent_env+0x2fb/0x1030 [ 959.370417][T14281] kobject_uevent+0x20/0x26 [ 959.374911][T14281] lo_ioctl+0x112b/0x2150 [ 959.379225][T14281] ? lo_rw_aio+0x1120/0x1120 [ 959.383801][T14281] blkdev_ioctl+0xee8/0x1c40 [ 959.388368][T14281] ? blkpg_ioctl+0xa90/0xa90 [ 959.392941][T14281] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 959.398725][T14281] ? __fget+0x35a/0x550 [ 959.402862][T14281] block_ioctl+0xee/0x130 [ 959.407176][T14281] ? blkdev_fallocate+0x410/0x410 [ 959.412180][T14281] do_vfs_ioctl+0xd6e/0x1390 [ 959.416752][T14281] ? ioctl_preallocate+0x210/0x210 [ 959.421840][T14281] ? __fget+0x381/0x550 [ 959.425978][T14281] ? ksys_dup3+0x3e0/0x3e0 [ 959.430396][T14281] ? do_sys_open+0x31d/0x5d0 [ 959.435050][T14281] ? tomoyo_file_ioctl+0x23/0x30 [ 959.439978][T14281] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 959.446228][T14281] ? security_file_ioctl+0x93/0xc0 [ 959.451320][T14281] ksys_ioctl+0xab/0xd0 [ 959.455462][T14281] __x64_sys_ioctl+0x73/0xb0 [ 959.460057][T14281] do_syscall_64+0x103/0x610 [ 959.464632][T14281] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 959.470504][T14281] RIP: 0033:0x457c97 [ 959.474383][T14281] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 959.493968][T14281] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 959.502449][T14281] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 959.510406][T14281] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 959.518359][T14281] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 959.526310][T14281] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 959.534379][T14281] R13: 0000000000000000 R14: 00000000004dbc78 R15: 0000000000000003 03:34:48 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3f00000000000000}}}}}}}}}, 0x0) 03:34:48 executing program 0: fstat(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f00000005c0)=0xe8) r2 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000600)={{{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000700)=0xe8) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x3, 0x1, &(0x7f0000000400)=[{&(0x7f00000003c0)="a019222499eb150b67ea49a5a7", 0xd, 0x4}], 0x802, &(0x7f0000000740)={[{@iocharset={'iocharset', 0x3d, 'macinuit'}}, {@discard_size={'discard'}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'em1./[posix_acl_access'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@subj_user={'subj_user', 0x3d, 'cgroupwlan1\':@},!'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', r0}}, {@obj_user={'obj_user', 0x3d, '&loGPLvboxnet0\\\xf9system'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@euid_lt={'euid<', r2}}, {@euid_gt={'euid>', r3}}]}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x4080, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x406, r4) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f0000000000)={0x0}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e23, 0x2ac4, @dev={0xfe, 0x80, [], 0xa}, 0x64e8}}}, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000180)={0x0, 0x2c}, &(0x7f00000000c0)=0x640b14d9) setsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f00000002c0)={r6, 0xfffffffffffffff9}, 0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=r7, &(0x7f0000000140)=0x4) [ 959.589733][T14291] EXT4-fs (sda1): Unrecognized mount option "debug [ 959.589733][T14291] want_extra_isize=0x0000000000000000" or missing value 03:34:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x3f000000}) 03:34:48 executing program 5 (fault-call:2 fault-nth:21): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) [ 959.761154][T14305] jfs: Unrecognized mount option "smackfsfloor=em1./[posix_acl_access" or missing value [ 959.820433][T14313] FAULT_INJECTION: forcing a failure. [ 959.820433][T14313] name failslab, interval 1, probability 0, space 0, times 0 [ 959.833212][T14313] CPU: 1 PID: 14313 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 959.842222][T14313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 959.842228][T14313] Call Trace: [ 959.842250][T14313] dump_stack+0x172/0x1f0 [ 959.842270][T14313] should_fail.cold+0xa/0x15 [ 959.842289][T14313] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 959.842308][T14313] ? ___might_sleep+0x163/0x280 [ 959.842328][T14313] __should_failslab+0x121/0x190 [ 959.842344][T14313] should_failslab+0x9/0x14 [ 959.842356][T14313] kmem_cache_alloc_node+0x264/0x710 [ 959.842372][T14313] ? find_held_lock+0x35/0x130 [ 959.860609][T14313] __alloc_skb+0xd5/0x5e0 [ 959.860624][T14313] ? skb_trim+0x190/0x190 [ 959.860641][T14313] ? kasan_check_read+0x11/0x20 [ 959.860657][T14313] alloc_uevent_skb+0x83/0x1e2 [ 959.913309][T14313] kobject_uevent_env+0xa63/0x1030 [ 959.918411][T14313] kobject_uevent+0x20/0x26 [ 959.922990][T14313] lo_ioctl+0x112b/0x2150 [ 959.927295][T14313] ? lo_rw_aio+0x1120/0x1120 [ 959.931860][T14313] blkdev_ioctl+0xee8/0x1c40 [ 959.936425][T14313] ? blkpg_ioctl+0xa90/0xa90 [ 959.940987][T14313] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 959.946772][T14313] ? __fget+0x35a/0x550 [ 959.950902][T14313] block_ioctl+0xee/0x130 [ 959.955223][T14313] ? blkdev_fallocate+0x410/0x410 [ 959.960227][T14313] do_vfs_ioctl+0xd6e/0x1390 [ 959.964793][T14313] ? ioctl_preallocate+0x210/0x210 [ 959.969897][T14313] ? __fget+0x381/0x550 [ 959.974026][T14313] ? ksys_dup3+0x3e0/0x3e0 [ 959.978433][T14313] ? do_sys_open+0x31d/0x5d0 [ 959.983128][T14313] ? tomoyo_file_ioctl+0x23/0x30 [ 959.988055][T14313] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 959.994284][T14313] ? security_file_ioctl+0x93/0xc0 [ 959.999373][T14313] ksys_ioctl+0xab/0xd0 [ 960.003505][T14313] __x64_sys_ioctl+0x73/0xb0 [ 960.008072][T14313] do_syscall_64+0x103/0x610 [ 960.012681][T14313] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 960.018549][T14313] RIP: 0033:0x457c97 [ 960.022511][T14313] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 960.042096][T14313] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 960.050514][T14313] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 960.058548][T14313] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 960.066500][T14313] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 960.074453][T14313] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 960.082399][T14313] R13: 0000000000000000 R14: 00000000004dbc78 R15: 0000000000000003 03:34:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug\x8ewant_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:48 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4305000000000000}}}}}}}}}, 0x0) 03:34:48 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2000, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000000c0)={'raw\x00', 0x2, [{}, {}]}, 0x48) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x0, 0x0) 03:34:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x40000000}) 03:34:48 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4800000000000000}}}}}}}}}, 0x0) 03:34:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x70140000}) 03:34:48 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x210000, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x8000, 0x44000) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000100)={r1, 0x2, 0x2, "c70b73c8fe1b0f4d5da636f23803e1e755878d16487095dfb5804179"}) 03:34:48 executing program 5 (fault-call:2 fault-nth:22): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:48 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6000000000000000}}}}}}}}}, 0x0) 03:34:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xa5ffffff}) [ 960.296204][T14335] EXT4-fs (sda1): Unrecognized mount option "debugŽwant_extra_isize=0x0000000000000000" or missing value 03:34:49 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x800e000000000000}}}}}}}}}, 0x0) 03:34:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xb6000000}) [ 960.360818][T14343] FAULT_INJECTION: forcing a failure. [ 960.360818][T14343] name failslab, interval 1, probability 0, space 0, times 0 [ 960.381425][T14343] CPU: 0 PID: 14343 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 960.390485][T14343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 960.400819][T14343] Call Trace: [ 960.404112][T14343] dump_stack+0x172/0x1f0 [ 960.408448][T14343] should_fail.cold+0xa/0x15 [ 960.413052][T14343] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 960.418971][T14343] ? ___might_sleep+0x163/0x280 [ 960.423910][T14343] __should_failslab+0x121/0x190 [ 960.428848][T14343] should_failslab+0x9/0x14 [ 960.433349][T14343] kmem_cache_alloc_node+0x264/0x710 [ 960.438716][T14343] ? find_held_lock+0x35/0x130 [ 960.443497][T14343] __alloc_skb+0xd5/0x5e0 [ 960.447818][T14343] ? skb_trim+0x190/0x190 [ 960.452139][T14343] ? kasan_check_read+0x11/0x20 [ 960.456985][T14343] alloc_uevent_skb+0x83/0x1e2 [ 960.461746][T14343] kobject_uevent_env+0xa63/0x1030 [ 960.466859][T14343] kobject_uevent+0x20/0x26 [ 960.471367][T14343] lo_ioctl+0x112b/0x2150 [ 960.475697][T14343] ? lo_rw_aio+0x1120/0x1120 [ 960.480282][T14343] blkdev_ioctl+0xee8/0x1c40 [ 960.484878][T14343] ? blkpg_ioctl+0xa90/0xa90 [ 960.489488][T14343] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 960.495390][T14343] ? __fget+0x35a/0x550 [ 960.499546][T14343] block_ioctl+0xee/0x130 [ 960.503871][T14343] ? blkdev_fallocate+0x410/0x410 [ 960.508891][T14343] do_vfs_ioctl+0xd6e/0x1390 [ 960.513505][T14343] ? ioctl_preallocate+0x210/0x210 [ 960.518612][T14343] ? __fget+0x381/0x550 [ 960.522776][T14343] ? ksys_dup3+0x3e0/0x3e0 [ 960.527289][T14343] ? do_sys_open+0x31d/0x5d0 [ 960.531878][T14343] ? tomoyo_file_ioctl+0x23/0x30 [ 960.536811][T14343] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 960.543049][T14343] ? security_file_ioctl+0x93/0xc0 [ 960.548155][T14343] ksys_ioctl+0xab/0xd0 [ 960.552315][T14343] __x64_sys_ioctl+0x73/0xb0 [ 960.556909][T14343] do_syscall_64+0x103/0x610 [ 960.561501][T14343] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 960.567476][T14343] RIP: 0033:0x457c97 [ 960.572366][T14343] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 960.591964][T14343] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 960.600369][T14343] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 960.608329][T14343] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 960.616293][T14343] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 960.624261][T14343] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 960.632553][T14343] R13: 0000000000000000 R14: 00000000004dbc78 R15: 0000000000000003 03:34:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_\nant_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:49 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8035000000000000}}}}}}}}}, 0x0) 03:34:49 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x2000, 0x0) ioctl$KDMKTONE(r0, 0x4b30, 0xef) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000100)={0x3f, 0x3}) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f00000000c0)={0x1, 0xfffffffffffffff8, 0x4, 0x0, 0x1, 0xb88}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:34:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xb8ffffff}) 03:34:49 executing program 0: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x8, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000200)={0x100, 0x2, 0x7, 0x8, 0x14, 0xa0e, 0x3, 0x5, 0x10001, 0xffffffffffffffe1, 0x62, 0x9d}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000240)=0x100000001) fchdir(r0) r1 = shmget$private(0x0, 0x1000, 0x1036, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_INFO(r1, 0xe, &(0x7f0000000040)=""/21) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000140)=""/79) r2 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0xffffffff80000000, 0x10800) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x800, 0x0) ioctl$VIDIOC_EXPBUF(r2, 0xc0405610, &(0x7f0000000100)={0x2, 0x60, 0x1, 0x80000, r3}) 03:34:49 executing program 5 (fault-call:2 fault-nth:23): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:49 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8100000000000000}}}}}}}}}, 0x0) 03:34:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xc8000020}) [ 960.999793][T14364] EXT4-fs (sda1): Unrecognized mount option "debug_ [ 960.999793][T14364] ant_extra_isize=0x0000000000000000" or missing value 03:34:49 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x86ddffff00000000}}}}}}}}}, 0x0) [ 961.040905][T14372] FAULT_INJECTION: forcing a failure. [ 961.040905][T14372] name failslab, interval 1, probability 0, space 0, times 0 [ 961.084252][T14372] CPU: 1 PID: 14372 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 961.093289][T14372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 961.103337][T14372] Call Trace: [ 961.106622][T14372] dump_stack+0x172/0x1f0 [ 961.110950][T14372] should_fail.cold+0xa/0x15 [ 961.115534][T14372] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 961.121335][T14372] ? ___might_sleep+0x163/0x280 [ 961.126197][T14372] __should_failslab+0x121/0x190 [ 961.131126][T14372] should_failslab+0x9/0x14 [ 961.135615][T14372] kmem_cache_alloc+0x2b2/0x6f0 [ 961.140451][T14372] ? __fget+0x381/0x550 [ 961.144596][T14372] getname_flags+0xd6/0x5b0 [ 961.149102][T14372] do_mkdirat+0xa0/0x2a0 [ 961.153335][T14372] ? __ia32_sys_mknod+0xb0/0xb0 [ 961.158186][T14372] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 961.163730][T14372] ? do_syscall_64+0x26/0x610 [ 961.168392][T14372] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 961.174452][T14372] ? do_syscall_64+0x26/0x610 [ 961.179144][T14372] ? lockdep_hardirqs_on+0x418/0x5d0 [ 961.184425][T14372] __x64_sys_mkdir+0x5c/0x80 [ 961.189006][T14372] do_syscall_64+0x103/0x610 [ 961.193586][T14372] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 961.199464][T14372] RIP: 0033:0x457247 [ 961.203360][T14372] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 961.222962][T14372] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 03:34:49 executing program 0: r0 = dup(0xffffffffffffffff) symlinkat(&(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00') r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x101000, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x4040, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f00000000c0)={0x0, 0xd9f, 0x8, 0x8001, 0x0, 0x3f}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:34:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xfbffffff}) 03:34:49 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x100, 0x0) [ 961.231359][T14372] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 961.239334][T14372] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000200 [ 961.247378][T14372] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 961.255341][T14372] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 961.263302][T14372] R13: 0000000000000000 R14: 00000000004dbc78 R15: 0000000000000003 [ 961.370795][ T26] audit: type=1800 audit(1551584090.006:77): pid=14387 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17431 res=0 [ 961.424145][T14391] EXT4-fs (sda1): Unrecognized mount option "debug_ [ 961.424145][T14391] ant_extra_isize=0x0000000000000000" or missing value 03:34:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_\x8eant_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xfdfdffff}) 03:34:50 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8847000000000000}}}}}}}}}, 0x0) 03:34:50 executing program 5 (fault-call:2 fault-nth:24): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) [ 961.508552][ T26] audit: type=1800 audit(1551584090.146:78): pid=14387 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17431 res=0 03:34:50 executing program 0: prctl$PR_SET_THP_DISABLE(0x29, 0x2) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x2b2, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000000c0)='jfs\x00'}, 0x30) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = dup3(r0, 0xffffffffffffff9c, 0x80001) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000040)={0x3}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f0000000180)='vfat\x00', &(0x7f00000001c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="5d1569537fb7855529025ec7ae471ae2444a7aa63ca6bc346c95d4d0637a5b61d8656958cd72c46f897eefa3e0c7c2efe9ec9a29b03cfd02e0e3c600cce9b31cb7b1f02beba8cb84c557dfc264cb184f20389e7ada69affa8df32e321d4ea98b1934578b62d132a3d1eb0463232ea00d97fac213a03c4f5b75d86d1d0c39cb4b469ef1e45024a64cb66a759a5d8b71f519481a185d75430d5d7ec960fecad1774185246d29a3302af05cba3112d914f38797864e5ed806f133538d9102b5e67ccf5a09ca7ee934e5d3ba", 0xca, 0x100000001}, {&(0x7f0000000300)="296b374e772087d473aa3ef3c4aa3e4b9668183a23426c26c851af62bd232ec3dd2f402085c750c44931a3503104", 0x2e, 0xd69}], 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB='nonumtail=0,nonumtail=0,uni_xlate=1,shortname=mixed,fowner<', @ANYRESDEC=r2, @ANYBLOB=',uid<', @ANYRESDEC=r3, @ANYBLOB='|\x00']) 03:34:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xfffffdfd}) 03:34:50 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8848000000000000}}}}}}}}}, 0x0) 03:34:50 executing program 0: munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) r0 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0x0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vfio/vfio\x00', 0x20100, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f0000000340)=0x8001) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000240)) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) getsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f00000000c0)=""/234, &(0x7f00000001c0)=0xea) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 961.675955][T14402] FAULT_INJECTION: forcing a failure. [ 961.675955][T14402] name failslab, interval 1, probability 0, space 0, times 0 [ 961.688659][T14402] CPU: 0 PID: 14402 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 961.688669][T14402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 961.688674][T14402] Call Trace: [ 961.688697][T14402] dump_stack+0x172/0x1f0 [ 961.688720][T14402] should_fail.cold+0xa/0x15 [ 961.688740][T14402] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 961.688752][T14402] ? __sigqueue_alloc+0x173/0x4d0 [ 961.688770][T14402] ? find_held_lock+0x35/0x130 [ 961.707930][T14402] __should_failslab+0x121/0x190 [ 961.707949][T14402] should_failslab+0x9/0x14 [ 961.707964][T14402] kmem_cache_alloc+0x47/0x6f0 [ 961.708001][T14402] ? kasan_check_read+0x11/0x20 [ 961.708022][T14402] __sigqueue_alloc+0x268/0x4d0 [ 961.708039][T14402] __send_signal+0xda3/0x1590 [ 961.708062][T14402] send_signal+0x49/0xd0 [ 961.715651][T14402] force_sig_info+0x251/0x310 03:34:50 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000000c0)=""/4096, &(0x7f0000000000)=0x1000) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000001100)=@get={0x1, &(0x7f00000010c0)=""/51, 0x8001}) 03:34:50 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8864000000000000}}}}}}}}}, 0x0) 03:34:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xffffffa5}) [ 961.715672][T14402] force_sig_fault+0xbb/0xf0 [ 961.715686][T14402] ? force_sigsegv+0x120/0x120 [ 961.715711][T14402] ? trace_hardirqs_on+0x67/0x230 [ 961.715730][T14402] __bad_area_nosemaphore+0x332/0x420 [ 961.715749][T14402] bad_area+0x69/0x80 [ 961.739658][T14408] EXT4-fs (sda1): Unrecognized mount option "debug_Žant_extra_isize=0x0000000000000000" or missing value [ 961.740895][T14402] __do_page_fault+0x996/0xda0 [ 961.740920][T14402] do_page_fault+0x71/0x581 [ 961.740935][T14402] ? page_fault+0x8/0x30 [ 961.740950][T14402] page_fault+0x1e/0x30 [ 961.740978][T14402] RIP: 0033:0x451adf [ 961.773449][T14402] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 961.773456][T14402] RSP: 002b:00007f0611a0ca88 EFLAGS: 00010283 [ 961.773468][T14402] RAX: 00007f0611a0cad0 RBX: 0000000000000010 RCX: 0000000000000000 [ 961.773476][T14402] RDX: 000000000000001f RSI: 0000000000000000 RDI: 00007f0611a0cad0 [ 961.773485][T14402] RBP: 0000000000000000 R08: 000000000000001f R09: 000000000000000a [ 961.773493][T14402] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 961.773501][T14402] R13: 0000000000000000 R14: 00000000004dbc78 R15: 0000000000000003 03:34:50 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x88a8ffff00000000}}}}}}}}}, 0x0) 03:34:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_w\nnt_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xffffffb8}) 03:34:50 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x88caffff00000000}}}}}}}}}, 0x0) 03:34:50 executing program 5 (fault-call:2 fault-nth:25): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xfffffffb}) 03:34:50 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x20000000000, 0x0, 0x0, 0x0, 0x0) 03:34:50 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8906000000000000}}}}}}}}}, 0x0) 03:34:50 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x101000, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) r1 = fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000100)={{0x0, 0x7, 0x0, 0x31, 'syz1\x00', 0x4}, 0x5, 0x20000032, 0x4, r1, 0x6, 0x3ff, 'syz0\x00', &(0x7f00000000c0)=['^.vmnet0\x00', '-selinuxvmnet0(\'+GPL\x00', '\x00', '-keyring+\x00', 'jfs\x00', 'jfs\x00'], 0x31, [], [0x2, 0x5, 0x8, 0x3]}) r2 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, r2) [ 962.192724][T14439] EXT4-fs (sda1): Unrecognized mount option "debug_w [ 962.192724][T14439] nt_extra_isize=0x0000000000000000" or missing value 03:34:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x10000000000}) [ 962.242242][T14444] FAULT_INJECTION: forcing a failure. [ 962.242242][T14444] name failslab, interval 1, probability 0, space 0, times 0 [ 962.281191][T14444] CPU: 0 PID: 14444 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 962.290239][T14444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 962.300287][T14444] Call Trace: [ 962.303662][T14444] dump_stack+0x172/0x1f0 [ 962.307991][T14444] should_fail.cold+0xa/0x15 [ 962.312578][T14444] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 962.318395][T14444] ? ___might_sleep+0x163/0x280 [ 962.323237][T14444] __should_failslab+0x121/0x190 [ 962.328166][T14444] should_failslab+0x9/0x14 [ 962.332794][T14444] __kmalloc_track_caller+0x2d8/0x740 [ 962.338159][T14444] ? setup_sigcontext+0x7d0/0x7d0 [ 962.343179][T14444] ? __bad_area_nosemaphore+0xb3/0x420 [ 962.348627][T14444] ? strndup_user+0x77/0xd0 [ 962.353120][T14444] memdup_user+0x26/0xb0 [ 962.357355][T14444] strndup_user+0x77/0xd0 [ 962.361706][T14444] ksys_mount+0x3c/0x150 [ 962.366031][T14444] __x64_sys_mount+0xbe/0x150 [ 962.370716][T14444] do_syscall_64+0x103/0x610 [ 962.375306][T14444] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 962.381182][T14444] RIP: 0033:0x45a89a [ 962.385073][T14444] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 962.404663][T14444] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 962.413154][T14444] RAX: ffffffffffffffda RBX: 00007f0611a0cb30 RCX: 000000000045a89a [ 962.421114][T14444] RDX: 00007f0611a0cad0 RSI: 0000000020000200 RDI: 00007f0611a0caf0 [ 962.429075][T14444] RBP: 0000000020000200 R08: 00007f0611a0cb30 R09: 00007f0611a0cad0 03:34:51 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffff000}}}}}}}}}, 0x0) [ 962.437036][T14444] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000000000004 [ 962.445020][T14444] R13: 0000000000000020 R14: 00000000004dbc78 R15: 0000000000000003 03:34:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x1000000000000}) 03:34:51 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2}}}}}}}}}, 0x0) 03:34:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_w%nt_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:51 executing program 5 (fault-call:2 fault-nth:26): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:51 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f00000000c0)) 03:34:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xd000000000000}) [ 962.838478][T14467] FAULT_INJECTION: forcing a failure. [ 962.838478][T14467] name failslab, interval 1, probability 0, space 0, times 0 [ 962.851181][T14467] CPU: 0 PID: 14467 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 962.851190][T14467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 962.851194][T14467] Call Trace: [ 962.851217][T14467] dump_stack+0x172/0x1f0 [ 962.851237][T14467] should_fail.cold+0xa/0x15 [ 962.851256][T14467] ? fault_create_debugfs_attr+0x1e0/0x1e0 03:34:51 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}}, 0x0) [ 962.851270][T14467] ? __sigqueue_alloc+0x173/0x4d0 [ 962.851284][T14467] ? find_held_lock+0x35/0x130 [ 962.851301][T14467] __should_failslab+0x121/0x190 [ 962.851317][T14467] should_failslab+0x9/0x14 [ 962.851327][T14467] kmem_cache_alloc+0x47/0x6f0 [ 962.851344][T14467] ? kasan_check_read+0x11/0x20 [ 962.870435][T14467] __sigqueue_alloc+0x268/0x4d0 [ 962.870451][T14467] __send_signal+0xda3/0x1590 [ 962.870471][T14467] send_signal+0x49/0xd0 [ 962.870488][T14467] force_sig_info+0x251/0x310 [ 962.870509][T14467] force_sig_fault+0xbb/0xf0 [ 962.870523][T14467] ? force_sigsegv+0x120/0x120 [ 962.870548][T14467] ? trace_hardirqs_on+0x67/0x230 [ 962.870569][T14467] __bad_area_nosemaphore+0x332/0x420 [ 962.870586][T14467] bad_area+0x69/0x80 [ 962.870599][T14467] __do_page_fault+0x996/0xda0 [ 962.870621][T14467] do_page_fault+0x71/0x581 [ 962.870633][T14467] ? page_fault+0x8/0x30 [ 962.870649][T14467] page_fault+0x1e/0x30 [ 962.893787][T14467] RIP: 0033:0x451adf 03:34:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x10000000000000}) [ 962.893802][T14467] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 962.893810][T14467] RSP: 002b:00007f0611a0ca88 EFLAGS: 00010283 [ 962.893821][T14467] RAX: 00007f0611a0cad0 RBX: 0000000000000010 RCX: 0000000000000000 [ 962.893830][T14467] RDX: 000000000000001f RSI: 0000000000000000 RDI: 00007f0611a0cad0 [ 962.893837][T14467] RBP: 0000000000000000 R08: 000000000000001f R09: 000000000000000a [ 962.893844][T14467] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 962.893852][T14467] R13: 0000000000000000 R14: 00000000004dbc78 R15: 0000000000000003 03:34:51 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x9, 0x40100) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000000180)={0x0, 0x35}) ioctl$TCFLSH(r0, 0x540b, 0x7) r1 = shmget(0x2, 0x3000, 0x78000050, &(0x7f0000ffd000/0x3000)=nil) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x103000) getpeername$llc(r2, &(0x7f00000000c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000100)=0x10) shmctl$SHM_UNLOCK(r1, 0xc) 03:34:51 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xd}}}}}}}}}, 0x0) [ 963.109818][T14475] EXT4-fs: 1 callbacks suppressed [ 963.109829][T14475] EXT4-fs (sda1): Unrecognized mount option "debug_w%nt_extra_isize=0x0000000000000000" or missing value 03:34:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x20000000000000}) 03:34:51 executing program 5 (fault-call:2 fault-nth:27): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:51 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x28}}}}}}}}}, 0x0) 03:34:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x100000000000000}) [ 963.365260][T14495] EXT4-fs (sda1): Unrecognized mount option "debug_w%nt_extra_isize=0x0000000000000000" or missing value [ 963.382970][T14499] FAULT_INJECTION: forcing a failure. [ 963.382970][T14499] name failslab, interval 1, probability 0, space 0, times 0 [ 963.414764][T14499] CPU: 1 PID: 14499 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 963.423811][T14499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 963.433852][T14499] Call Trace: [ 963.437139][T14499] dump_stack+0x172/0x1f0 [ 963.441465][T14499] should_fail.cold+0xa/0x15 [ 963.446137][T14499] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 963.451957][T14499] ? ___might_sleep+0x163/0x280 [ 963.456805][T14499] __should_failslab+0x121/0x190 [ 963.461745][T14499] should_failslab+0x9/0x14 [ 963.466244][T14499] kmem_cache_alloc_trace+0x2d1/0x760 [ 963.471697][T14499] ? apparmor_capable+0x2ed/0x630 [ 963.476711][T14499] ? cap_capable+0x205/0x270 [ 963.481310][T14499] alloc_fs_context+0x5a/0x640 [ 963.486096][T14499] fs_context_for_reconfigure+0x73/0x90 [ 963.491650][T14499] do_mount+0x8ba/0x2c40 [ 963.495892][T14499] ? copy_mount_string+0x40/0x40 [ 963.500819][T14499] ? _copy_from_user+0xdd/0x150 [ 963.505666][T14499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 963.511903][T14499] ? copy_mount_options+0x280/0x3a0 [ 963.517094][T14499] ksys_mount+0xdb/0x150 [ 963.521330][T14499] __x64_sys_mount+0xbe/0x150 [ 963.526006][T14499] do_syscall_64+0x103/0x610 [ 963.530589][T14499] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 963.536472][T14499] RIP: 0033:0x45a89a [ 963.540367][T14499] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 963.559963][T14499] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 963.568392][T14499] RAX: ffffffffffffffda RBX: 00007f0611a0cb30 RCX: 000000000045a89a [ 963.576367][T14499] RDX: 00007f0611a0cad0 RSI: 0000000020000200 RDI: 00007f0611a0caf0 [ 963.584329][T14499] RBP: 0000000020000200 R08: 00007f0611a0cb30 R09: 00007f0611a0cad0 [ 963.592294][T14499] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000000000004 [ 963.600253][T14499] R13: 0000000000000020 R14: 00000000004dbc78 R15: 0000000000000003 03:34:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_w\x8ent_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:52 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x30}}}}}}}}}, 0x0) 03:34:52 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1a0, 0x0, 0x20000, 0x0) 03:34:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x200000000000000}) 03:34:52 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x48}}}}}}}}}, 0x0) 03:34:52 executing program 5 (fault-call:2 fault-nth:28): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) [ 963.945789][T14512] EXT4-fs (sda1): Unrecognized mount option "debug_wŽnt_extra_isize=0x0000000000000000" or missing value 03:34:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x400000000000000}) 03:34:52 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60}}}}}}}}}, 0x0) 03:34:52 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000000c0)={{0x97d7, 0x2, 0x1000, 0x1, 0x101, 0x6}, 0x3, 0x816, 0x20d2, 0x1400000000000000, 0x8000, "14c1025b66d6d53731ca803793a3471c278238ced22e1885f1ba6170d725fe5d1b75d91ffd414d7ef938599e7ad6c24c214ecc97ef088bb570415f0b5daa2ca2aeda79133d5d0eb25f9dfb7a06e0b659381b3d42303471e7bc9ce9fab22fa0ff31e24ec035377432bd15c87cdb93a5963ca1cb52c0c99cf08d1437baa3fdbdd2"}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:34:52 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000140)={{0x100000000, 0x1}, {0x8, 0x9}, 0x3fa, 0x1, 0x8}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/snmp6\x00') lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getgid() fchownat(r1, &(0x7f00000000c0)='./file0\x00', r2, r3, 0x800) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000280)=""/251) [ 964.065575][T14522] FAULT_INJECTION: forcing a failure. [ 964.065575][T14522] name failslab, interval 1, probability 0, space 0, times 0 [ 964.099170][T14522] CPU: 1 PID: 14522 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 964.108357][T14522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 964.118409][T14522] Call Trace: [ 964.118453][T14522] dump_stack+0x172/0x1f0 [ 964.118475][T14522] should_fail.cold+0xa/0x15 [ 964.118495][T14522] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 964.118521][T14522] ? ___might_sleep+0x163/0x280 [ 964.141282][T14522] __should_failslab+0x121/0x190 [ 964.141300][T14522] should_failslab+0x9/0x14 [ 964.141325][T14522] kmem_cache_alloc_trace+0x2d1/0x760 [ 964.156101][T14522] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 03:34:52 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xf0}}}}}}}}}, 0x0) [ 964.162333][T14522] ? _copy_from_user+0xdd/0x150 [ 964.162352][T14522] copy_mount_options+0x5c/0x3a0 [ 964.162366][T14522] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 964.162382][T14522] ksys_mount+0xa7/0x150 [ 964.162396][T14522] __x64_sys_mount+0xbe/0x150 [ 964.162412][T14522] do_syscall_64+0x103/0x610 [ 964.162430][T14522] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 964.172192][T14522] RIP: 0033:0x45a89a 03:34:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x900000000000000}) [ 964.172206][T14522] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 964.172213][T14522] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 964.172226][T14522] RAX: ffffffffffffffda RBX: 00007f0611a0cb30 RCX: 000000000045a89a [ 964.172235][T14522] RDX: 00007f0611a0cad0 RSI: 0000000020000200 RDI: 00007f0611a0caf0 [ 964.172243][T14522] RBP: 0000000020000200 R08: 00007f0611a0cb30 R09: 00007f0611a0cad0 [ 964.172250][T14522] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000000000004 [ 964.172258][T14522] R13: 0000000000000020 R14: 00000000004dbc78 R15: 0000000000000003 03:34:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_wa\nt_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:53 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x543}}}}}}}}}, 0x0) 03:34:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xd00000000000000}) 03:34:53 executing program 5 (fault-call:2 fault-nth:29): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:53 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x608}}}}}}}}}, 0x0) [ 964.543048][T14546] EXT4-fs (sda1): Unrecognized mount option "debug_wa [ 964.543048][T14546] t_extra_isize=0x0000000000000000" or missing value [ 964.560251][T14551] FAULT_INJECTION: forcing a failure. [ 964.560251][T14551] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 964.573477][T14551] CPU: 0 PID: 14551 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 964.582492][T14551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 964.592548][T14551] Call Trace: [ 964.595844][T14551] dump_stack+0x172/0x1f0 [ 964.600182][T14551] should_fail.cold+0xa/0x15 [ 964.604789][T14551] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 964.610597][T14551] ? __lock_acquire+0x548/0x3fb0 [ 964.615532][T14551] ? __save_stack_trace+0x8a/0xf0 [ 964.620559][T14551] should_fail_alloc_page+0x50/0x60 [ 964.625847][T14551] __alloc_pages_nodemask+0x1a1/0x7e0 [ 964.631215][T14551] ? __alloc_pages_slowpath+0x2900/0x2900 [ 964.636933][T14551] ? find_held_lock+0x35/0x130 03:34:53 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x689}}}}}}}}}, 0x0) 03:34:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x1b00000000000000}) [ 964.641693][T14551] ? __x64_sys_mount+0xbe/0x150 [ 964.646538][T14551] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 964.652358][T14551] cache_grow_begin+0x9c/0x860 [ 964.657119][T14551] ? getname_flags+0xd6/0x5b0 [ 964.661790][T14551] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 964.668033][T14551] kmem_cache_alloc+0x62d/0x6f0 [ 964.672882][T14551] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 964.678509][T14551] ? find_held_lock+0x35/0x130 [ 964.683270][T14551] getname_flags+0xd6/0x5b0 [ 964.687783][T14551] user_path_at_empty+0x2f/0x50 [ 964.693117][T14551] do_mount+0x150/0x2c40 [ 964.697356][T14551] ? copy_mount_options+0x5c/0x3a0 [ 964.702461][T14551] ? copy_mount_string+0x40/0x40 [ 964.707398][T14551] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 964.713648][T14551] ? _copy_from_user+0xdd/0x150 [ 964.718497][T14551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 964.724731][T14551] ? copy_mount_options+0x280/0x3a0 [ 964.729946][T14551] ksys_mount+0xdb/0x150 [ 964.734273][T14551] __x64_sys_mount+0xbe/0x150 [ 964.738952][T14551] do_syscall_64+0x103/0x610 [ 964.743558][T14551] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 964.749440][T14551] RIP: 0033:0x45a89a [ 964.753337][T14551] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 964.772950][T14551] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 964.781369][T14551] RAX: ffffffffffffffda RBX: 00007f0611a0cb30 RCX: 000000000045a89a 03:34:53 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x8}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000140)={r1, 0x75bb}, 0x8) [ 964.789344][T14551] RDX: 00007f0611a0cad0 RSI: 0000000020000200 RDI: 00007f0611a0caf0 [ 964.797325][T14551] RBP: 0000000020000200 R08: 00007f0611a0cb30 R09: 00007f0611a0cad0 [ 964.805291][T14551] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000000000004 [ 964.813263][T14551] R13: 0000000000000020 R14: 00000000004dbc78 R15: 0000000000000003 03:34:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x1d00000000000000}) 03:34:53 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffccc, 0x0, 0x0, 0x0) 03:34:53 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x806}}}}}}}}}, 0x0) 03:34:53 executing program 5 (fault-call:2 fault-nth:30): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) [ 965.002438][T14569] EXT4-fs (sda1): Unrecognized mount option "debug_wa [ 965.002438][T14569] t_extra_isize=0x0000000000000000" or missing value 03:34:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_wa%t_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:53 executing program 0: r0 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000015c0)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f00000016c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001700)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000001800)=0xe8) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x7, &(0x7f0000001500)=[{&(0x7f0000000100)="0b0c523b334571bf944394ef89af2f33cef63e496f9b7ab72db980a1b61645baa595eeba89707757d925a20d15385ad7d6ead9baca16babe7fd532207e45ad2906e90671df408173aa009d674daeba34833240840d433998934b2124672e6bf59c0ca696a4f756d26a3bb14d85add1ed9c08c1f8724534d857fbb5b907cc6a66b5b4f92583fa51c7afcd2968881a06c9067cd7612c6776a2435119dfe0f2fec8ff6a9fc84357af4071a97e5833895b92d8b55bbe429d920ad9819c67da6ce855dabff1cf89c2578b1e21414e9fb4398943c1d9b361a92b0c42095109fbcbc710ed4a25ae5c530f68ce8f67da", 0xec}, {&(0x7f0000000200)="c71fb7e8e9ab355969c2d5213f1bd1de4784efc0642524782357a96cff49e27b8026f72b95c814dbd17307efb31fdfcffdc1c4b2a87c06db5a24d9e32b12731c63155175fd7ec84fb22aa5efbe3af39229eaf76e0670", 0x56, 0x1}, {&(0x7f0000000280)="481b9a6f52d4d7db72d85e0a5660a6193d299a1d71c329601ca5ffbd4363ee011cc28edc5bbd114b555c2a85b1e9f754a41fb9c76240554924426a1e889c2a6f605b06f6cbaefe48222b66a773fc12b270e74fdab0e7a74294df91581829c2ea13355ed5f805946ca7daba85883065a33753f5bb8d0b062137a6b90b9a2f30660a0b0714149fc110fcd316260c8df2337d8ed17c387d013674dbcea539c73fc992bb23cb04078e4cb0e3c979107c2b3af7aaa49e6d39118d8db82720e09c4be45444368636c2fd39781f4c8bc07713", 0xcf, 0x4}, {&(0x7f0000000380)="e57cf0210d9395ccf8d974feb554f984b031ef7c023fa0cec502c1cd00c70634f6a9c4c53e40130a7dd8c5ed433def24565140b1dc23f0045202db9a56cdb5", 0x3f, 0x7}, {&(0x7f00000003c0)="ba8694740f7c730ab9eb7b571a9c46b5d3881d93960b7d184cd215ea70f86a3fbe0bc0cd3f7ed984dd1dffd51f5763e96335c6305966cce5364d21a849c092b3562d3095e4b06b5c1de97f3b8eb504f986841e5ff7bacc02cd4ed8ffa7582740335a1e02acf84c6800c2e45d1cec5fc1d80596e51a03308a0e656670de263c9f401356f8b055effde4af2044878ebaae9737903f3431846722b34800f62f3bfc026c0f04f05368e73cff44ea0e291f018cc8f126a34614bf488e4d1b5ab96deb3ffa0156d42a73a5902a4b2886412b085f5cdce6249aad12a709ec7fc15756616e5732866918941f", 0xe8, 0x3ff}, {&(0x7f00000004c0)="344a99a9a434c72cb0897b75b9d533cc5c049ce556", 0x15}, {&(0x7f0000000500)="fad83bf0a939b454de7934cf6b94f85df5f76a8fb7b43007b26e9369c1d093b3bfaa94e4adcafbc1d1a7c47b4c236f23883e9a505b040e4cf3d51eba0d299481a8cae814fc476ebe7fcedd20474a9ce08d72475d74863b21869627c0de9a2d5bd1ded8292aaec22165bfafa9560b09a0870ae75e0274f64021fafc380dae899b44ceaf9b52c6c7dfff2fa0e48bf2b42319e6d3d85a22a37592067c6cb61fefdbb1b4c32d680f4658e50ff6f342217b91c735ba31bc2ffb31aa5a285e099e4aef71df7a79322e7fe5a5a6ac239160bf0455e664d09e266ea24865b11936559d628ad067dd9a912a300db70159907bab5a053e0f9c61189fdedf2b6b8929ea019bc14596abdf70545c283d19bbaa5d497e8d8e6e08e983adb2093273b87f9c84756035973955b976fd077a74c7606b9558f100be9f628690e8040e96e9d19d6421ffab2e9fa35de0a9a2c08ae24e79489b4990846fa97056ea318987c99c9e6439274346d07a081c479f9ee2fad5c80b25c6119ce4eaf8ed41fae99ccca82b2b6104706e1d2433ce5c0d0731495ab6f8492ef824ddcce7aa784b5c4d8964c7806928136d58f6b9195d4195d4cb44b6c74702f1e71e4c6abb3fa44e0fb8d7a03d67f1880dc0c7a24aff6135698ec57a7c702b10208dd02aded4d4a38a5b43d6e84ebe047e9c61dd5aa027af886562364bcc9e87d3d3ed9f817d99f4f3019d7b89d47a06cad88e87bce5f29f73f9d74545ba08ad8590ac36447ed0cece4406d3e38baa96edcae5cfa848601bda7ca5ff5edbcbc1a4ef6bdb228e9227f863e50349b387f115f2e9fb2f351dcc3b47724c121ef633778aa33f4337c41f856b3babf9437485812ea85dc534646658f25d95fc5a3091d3fd85ab0fcfb63208a4cb697bcbd05bf64aafe5b9bfe8bf64e8f0184fb39f9fc0c922327fc1322bc23f72ee37a013170d20243ba62a46287d94d400a70ddc6f70e1de32dba0f36855b26672119925db1b12cc0e8b21fe53f766c4e141c572d9e60f35bde36bf95e6e763c4e16c13edbac7253970ade047488164df8fa023591dcd8be0552eca7a31b3e855112fc8062b53be234f7678c8fe73623180c510a3438870889b867401bfd7d982134b69a8326b7be2b1bea247cf160a4c6d738720e678cf15472f0ad123510d24262e8ac329f3f80950b3046948089df905d4ff1978d770b89da0f608855643173e7d3638cde57fbf79b6c74deda30c8852a86d1e28d6ab25610cf67d71fd88fe20a5c90c8cb28b6fba917492bfa690f60c16ccb8efa58d040cebdce7fa8368655394e5ece3e642702dc2281bd0e10b8bb8a80319886b6917a25d8b3cdf21933393ace512240ebe9fa797a3fd6632b7b7198d8abc2c0060aba50860a9b20a092ef424535e0f60b43031af0732aa7c82c349745b963b9795afe10553a51feecddce622216a2ead391d76393817b6f60f44c9914ee688001a69e739cb59c48bfd76180feda17f4ff2a52891a9ca9a9c3f8159160c7ba11f7e19d00f08eafd835368d14963cf0aac8694bf4999f357798471e0f007080068cde0213a4253a961e046965d755bc6f1bfec76eccafd4822daa762ef081e81d8a8e3f766b3a4222e103ab11d41cbfad73395a9e71eb4254c4d8edbed51e34b73603d98a3c3e418edf6c5913495de181e4540076eb8a09c61b8298733081d659e2a36a39a14106284abcb1fefe06b2c72e1456af8a3e0cc050ae30936a60241fc597f9c92fac477b2f94f63c6833a10c70ebc37938466f8411b8e1a3e2e4f6a9193ec3c44d1c35691ab763d5ab5cc684deb40129567eb7e6d3ed85dc3e928683c8056c7857fcd72dd5d306e6bff0097a4c1032bf71f0ad030da01826f2d7c1272abc0dbe82780a20e6110fd6d03c732d658feb7b046516c5262e31904a2719c868cebc379b3dbb74fce9591b906325bbe8c1d56aa0340d71ba3710ba700c8e4477a5b62eafe7ad521a4edf2dc974a79fdcb6aa2a9be82ca2c7a7dae483e2834b9ec7ab4b4c83205226063ad66a08bd7338cb0f0ad0d1bfca6e70caa805e0eb588c6d2e10d673df6df88f6a6cd7bd602e54da3ed6ae7f1c36f0cfe637d0e1931c7984252517615de44f32b98d23332b4cd6c14010125ba7b18b8f556307f72df9dcb0b98148b7efa50a66f23001b0235bd11b1ae5450a2a4621d542e40644e37d1559d9d9dc2470d11a0c27542d61d3726dc27fe7b72e6002a8466bde9181b00f850760b8ca0d104d95fce35d5cd3cdcc6b2dd7fe31ad20d34c1ba9549034f6ec87649f41b5566402a2f49053a6ec12ec5a40314fb916ac1c6949836e09f8e326628734711f3d7dcc481bb80f9487018d6eca2ed1cb5991704a30e03ff484859f8179b69ab84ac162d955bc7021748d4cb5e9bb45eb82fbb99a44153b46ea0f49523adeb42f0b68ddced7d6a1fec250075654dcfabfabf60d186fbd5bedc0dbebbc9350aa11f1a2fd3a9ce0ba54908e0656d423961059b522bc3df08fab58ea6250af4b7d4e54e9871de5a39fc1e879114ddd26a50b517e0a28a2da23b2d80905fe3b55bb274c327503d3d441eab90c12916c096418e8e4c1804b9f92b451819809668caf94fea98f979f83d412338d20fb488198ff3991210676a0c542537de70a2ef1241a67173a8bb0f055b056b8d4a1888df5bf6d3d37ef28d1cfe62d70daf2c7b8884c914482ef7030425e137330379447a661cd408a6d6141abe656af2b4a7b88b149d67978825a06b17c68b1ea2e6cf5bb00ce0fe8900ae507983a3cf51a71215682a6f7f8a2f360a59f6ba6f70a27a57fe83d7c2215df9246ae8c06c7ac0d838be26cfd105bf79c87d0955fb7a166beeb933d9469a51580649dd8dc2cce02206f1a31acdc29f7135b9868cb232d5fba1c4e0d1f58f7e78da97fac41067e7bedfd18ebbf7799930fb1e012065ddf3d12033b43832344e90aa4227ed58696b69220c576cd34f339d8c3c5e09e57594a769f0a3bb0351eed028acb3f2c6ad1b5cac950eedf9c88f8a7a27565ae4e032513372f45ae3910cd95f79994d3cd2e7b62691a303f5743167cfe30b99fdd9c71ae6fb7ac94ecc85a4fc1c30f23f838974c11b4721ad58751be9d7eb4221a59217aba5f69a9c6932bae96e57255394fcdadab1164d1b2dc215e8bf3ab2697364cc1da6d2fc360412562699e8292087f3f99c5bc6609c53dcdef27ceaf197492dbde4ee474dc48413c37900b5534e03158017736559f6dbf6286a1d82a24911689470bf115ea46213e335946a7b21e5e0c13e927b7ebee30ce898c6bcfb4975a5a76aca80ff8d7e657eefc71bcfdc2f130e823f4dd41bdbf25a45f34b0852b5aba4ca37a7b988a71e4c9841bb042ee07a5c7c5f3f4c2cd1ac28cc37345517a47f75ad51acff8073e621c597a7f6bac8a58e03a8462bbb10ce40e80b0a6a6643a37df7b52fef1bfa2e3a93150b252a9442921426e603b2b8b4c2e61f551301e41b9304c4b4594214c271601f1fb9b2c494b46952277a4347784815fed9e47f6c2dcc26d184f9cc0dbadf045b96485195eefd40d6cb1b1b2d17168c07d12b3c99cc6e6fb92fcf077267f78d57d7ddb64f01a8d27245eec5ea247edb3f8bd40624d26130146463d3078a4691fdc15203f0337e0cab1e80d8d3981e4d2c5ec9fbd45038bfc26a4d901cec3143718719760a5dee65918a62054ce82dfbe92d1739f29af1c7c608947e7d3408a413710dd532d7a2967d42657c182843f61ede7d3704dc1c216d3124cbab5a86b0b70b54bcff634f573c1da46929a4e13fd6b80dc4aea9c5c1b7e0785ff9a178930fe862c3d1bcc58a4f11f33e5f97ba76e11ee09acf4bbc82b7e1e965a188ed7faa121bb01d40b83813a2ae11c19f3c98c669f4a9e515c8275dbd0b1b4020c7c1bf3c16b76712445dc9d57a6dfd757ac21fe5942228a0d5e8cba009e7a0d21332bd0a00aeb61e9d89a6dadd277c8e51cf789a09834866ad5ec91ce24808a51ded3264ef68f2ffad1256617f91a51d7305dca02ac578bc5124df975494fb39beb835557f51efddfc84862306916cebdeae3e732e6293c832ccacdf5ef61900513eb14c7b2a4f72a2752d100f7064959e1626b5ca2f4dd75851b7cbf6c7900b5de8508a005317d61abeacdbf017d883f34d7db244da62a6de09d82b9b12dea894b85b96943cd7bd2bf51f9bfc545253e76bee184b186f7686fd2208aa9a4c9c200c21e54dd1151bc80bb2040ecb01da4524a40f29c02f92ee19e503332207e364c430bd24cd4f6329707d79681be99108c2dc19926a6ad509f97db8f1749c38188fcd35102864bac50cdecf62b2ac63b82287c00bf4ca5913524e002ce1e9edfe60ef224cce17fccfff76435039b050bb0cc716e44b96bf268ea7402d8d4c8421ce9c14f1c0b4660d37efeaa271ac11b5c6895092192e5e3da5a4453a8909647926860c296d644c9ab5128ba5491a87eb90ca8552affcb0b2b6d980e316fabb378bd788c9ba62bbd3f37038a4da6fae588a372a75d4b34085ed18ea7c0cf409d764d487285f28411c6f944a20e80b0c948dd562c086c7d974e20da40a69885af80aecfbfd8df0121cf44f8784c2b290823eeaaf2c42bd213d254ce6dfba15988b0c2008bc29237eea1a27897c5cc6e9133b8c4e71d3670534e150f5d961cd522418bb3edd6417205f591b70e7410c56aef9aebddfdf64213d8ceeb835043b89d36244a3802935828126f4ec11ee812686b4dad3dc31e3e0242dbc715ea05a88127a38ddde4b5ddb1cf05411be2b02b74641b420471a619a4ec8d7e9c24343cf5472d09a0f5827cbe7d480817ca7175b23e1c08f9f61c4119b63d1f4d3adee28752df5a9fe55afa9c30918591288247dc1142c025e3276b3e0b38ac4dda0042e568defb68c55a2afd51c102f8be8f8c2b805d802f9bc276b1dc94ee33039e86c4b55ca508d10097a5e91f20d147f0f16712ec0a72b3b554873c4b0365f14de1088e2b8eaf23418c7efda013cfea84e08d5f8be74d31ed00178c245c29c5b056b917ec2207b598082fa447d5d4a3bb5b4ce1230f6574cea9e2d8151b61b33dd3c62d0eeec8ef4eb3c3cff80fd7346ee80ae87616e73afbc239c763a381e29c1e5fab771ff911ba51d5091a7149d3831635aee83db38391057d49ab955964a531b471386d458abc526972d983aac6ea70be1dc42dc8ec9a14b1e25d4ad63669505cc03140d5db76e941101a7323e93fea9353c34d9f58514c6286a5945e65f0c564c6d392dc3029883fbd0ae2d4689b1c9e4efee71dfaaa3e05589614aa8854d61f93e1201706e08b2202054e42c5ac1d3fd05db2cf079d0cc313822d5241f2a46a258a78a618df7393bf40d6510beb326aac01d2ecfb584aeb508c47d39f2a2157dba8fd6c3fb6fec610d0c66aa9757a9e976d192b74332f57507e887c6d286bdbfab0e2e84475ef7826d18d688ddd46f6b4d700b3f3c16286179e650a798df698cde802d97a72ea64dc3ffa684e512e5217705f3c2f810d9feb18770765a8a658c062d514f4f697fb0e01b9096a2a0f214e5c166a3ccdd02a385d5cd4ed7f87a7e368fc305c44c32721311f69bf48d2bca96e6e04f419782b1cd72f5d2891c01136e0a1325436031c67c8c0760e91652a8008d7038349ce74cc3ca70709a49063cc579edca07668bc4e60addf1cfe06153b9cdb173447f9425f22528820a8336f1f2bfd972902393c55981456d588cfb6ade6af5ccd841d7fcb6c8db0514ed19b48a769984726559bac528505622c55a2b55bd8", 0x1000, 0xfffffffffffffee6}], 0x1002002, &(0x7f0000001840)=ANY=[@ANYBLOB='usrquota,resize,discard=0xfffffffffffffff7,uid>', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2c726f6f74636f6e746578743d756e636f6e66696e65645f752c7375626a5f726f6c653d2e76626f786e6574312d6c6f707070312d281a70726f632c636f6e746578743d73797374656d5f752c726f6f74636f6e746578743d726f6f742c66756e633d46494c455f4d4d41502c66736d616769633d3078103030303030303030303030306630632c7569643d", @ANYRESDEC=r2, @ANYBLOB=',\x00']) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:34:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x3700000000000000}) 03:34:53 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xd00}}}}}}}}}, 0x0) 03:34:53 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000001c0)=0xe8) getgroups(0x7, &(0x7f0000000200)=[0xffffffffffffffff, 0x0, 0xee00, 0x0, 0xffffffffffffffff, 0xee01, 0x0]) write$P9_RGETATTR(r0, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x800, {0x0, 0x0, 0x1}, 0x56, r1, r2, 0x800, 0x5, 0x100, 0x8, 0xd4, 0x101, 0x80000000, 0x0, 0x4, 0x21, 0x2, 0x80000001, 0x101, 0x3f, 0x4}}, 0xa0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0x0, 0x0, 0x20000, 0x0) [ 965.132079][T14580] FAULT_INJECTION: forcing a failure. [ 965.132079][T14580] name failslab, interval 1, probability 0, space 0, times 0 03:34:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x3f00000000000000}) [ 965.187433][T14580] CPU: 0 PID: 14580 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 965.196480][T14580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 965.206629][T14580] Call Trace: [ 965.209918][T14580] dump_stack+0x172/0x1f0 [ 965.214245][T14580] should_fail.cold+0xa/0x15 [ 965.218835][T14580] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 965.224659][T14580] ? ___might_sleep+0x163/0x280 [ 965.229696][T14580] __should_failslab+0x121/0x190 [ 965.234625][T14580] should_failslab+0x9/0x14 [ 965.239115][T14580] kmem_cache_alloc+0x2b2/0x6f0 [ 965.243955][T14580] ? cache_grow_end+0xa4/0x190 [ 965.248705][T14580] ? kasan_check_write+0x14/0x20 [ 965.253634][T14580] getname_flags+0xd6/0x5b0 [ 965.258126][T14580] user_path_at_empty+0x2f/0x50 [ 965.262967][T14580] do_mount+0x150/0x2c40 [ 965.267219][T14580] ? copy_mount_options+0x5c/0x3a0 [ 965.272333][T14580] ? copy_mount_string+0x40/0x40 [ 965.277263][T14580] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 965.283496][T14580] ? copy_mount_options+0x280/0x3a0 [ 965.288690][T14580] ksys_mount+0xdb/0x150 [ 965.292928][T14580] __x64_sys_mount+0xbe/0x150 [ 965.297602][T14580] do_syscall_64+0x103/0x610 [ 965.302191][T14580] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 965.308070][T14580] RIP: 0033:0x45a89a [ 965.311951][T14580] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 965.331538][T14580] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 965.339936][T14580] RAX: ffffffffffffffda RBX: 00007f0611a0cb30 RCX: 000000000045a89a [ 965.347898][T14580] RDX: 00007f0611a0cad0 RSI: 0000000020000200 RDI: 00007f0611a0caf0 [ 965.355860][T14580] RBP: 0000000020000200 R08: 00007f0611a0cb30 R09: 00007f0611a0cad0 [ 965.363820][T14580] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000000000004 [ 965.371892][T14580] R13: 0000000000000020 R14: 00000000004dbc78 R15: 0000000000000003 03:34:54 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe80}}}}}}}}}, 0x0) 03:34:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x4000000000000000}) [ 965.482503][T14595] EXT4-fs (sda1): Unrecognized mount option "debug_wa%t_extra_isize=0x0000000000000000" or missing value 03:34:54 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2000}}}}}}}}}, 0x0) 03:34:54 executing program 5 (fault-call:2 fault-nth:31): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x7014000000000000}) 03:34:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xa5ffffff00000000}) 03:34:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_wa\x8et_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) [ 965.692696][T14610] FAULT_INJECTION: forcing a failure. [ 965.692696][T14610] name failslab, interval 1, probability 0, space 0, times 0 [ 965.730418][T14610] CPU: 1 PID: 14610 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 965.739450][T14610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 965.749524][T14610] Call Trace: [ 965.752820][T14610] dump_stack+0x172/0x1f0 [ 965.757152][T14610] should_fail.cold+0xa/0x15 [ 965.761734][T14610] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 965.767532][T14610] ? ___might_sleep+0x163/0x280 [ 965.772462][T14610] __should_failslab+0x121/0x190 [ 965.777393][T14610] should_failslab+0x9/0x14 [ 965.781884][T14610] kmem_cache_alloc_trace+0x2d1/0x760 [ 965.787241][T14610] ? apparmor_capable+0x2ed/0x630 [ 965.792255][T14610] ? cap_capable+0x205/0x270 [ 965.796852][T14610] alloc_fs_context+0x5a/0x640 [ 965.801603][T14610] fs_context_for_reconfigure+0x73/0x90 [ 965.807137][T14610] do_mount+0x8ba/0x2c40 [ 965.811373][T14610] ? copy_mount_string+0x40/0x40 [ 965.816307][T14610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 965.822533][T14610] ? copy_mount_options+0x280/0x3a0 [ 965.827735][T14610] ksys_mount+0xdb/0x150 [ 965.831964][T14610] __x64_sys_mount+0xbe/0x150 [ 965.836632][T14610] do_syscall_64+0x103/0x610 [ 965.841219][T14610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 965.847101][T14610] RIP: 0033:0x45a89a [ 965.850996][T14610] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 965.871098][T14610] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 965.879596][T14610] RAX: ffffffffffffffda RBX: 00007f0611a0cb30 RCX: 000000000045a89a 03:34:54 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x5, &(0x7f0000000380)=[{&(0x7f0000000100)="4cc7fd22241b4045d662ed4e62c0d6b3414e50e66ef27a63ae27f9208b77b4284b1a9936e3496c5ac7477c72b68d1d89095cd2453bc80b3b86336dcb55e97664c0e1e9f67a479aec95893fc3e08655c3db89ae40f54b6eed209930c56443852bad31c1fd0d59394be983d572de79bad869dfa941c976276f0a8dad0b7d8837ceec9ca4c391c211cab60840ab3b75112cbc6b9b7b436ae7d991d6f42e827d3f6b90ec6efe0d7ab0b1f6ff202174eac4409b474f", 0xb3, 0x10000}, {&(0x7f00000001c0)="ec48048f02306f3d5b432e9cf0385eb90cbfd217ff419e92ef4a8e34a41430f018c71b75a73d8951af1e396e575820d3c9a916825ac9842d0053342fbfee92059702cbe4db9abd9586ac889787d2cf88871c5b55c14e81068c4f2b61943378578a2f9001eb", 0x65, 0x8}, {&(0x7f0000000240)="4617232a7cd03bdb4a7c3a02f62c1b280336b68066d00549a6e18c306dcd881d72", 0x21, 0x100000001}, {&(0x7f0000000280)="a15f050cacc46d9d6142472a55ca901731b64a99dcd1b977380d65daac417a0ddfa1190c604f86865feca62673fd388c31316271aa968e368a453580c2742384b0fb981991c8779cb89d79bf9391f829f94bcd913c8321393f8c75a8d2db18e271746139d0526651d7ba502b519f9b9a4b19ac426fc33dde294390f8211e0673803eaabbd4ac64f55b", 0x89}, {&(0x7f0000000340)="781c475e2f6356e79b55e598077b9cd2abd9e0093990910c8d549944338d0a93324447a45d7a6ef966", 0x29, 0x200}], 0x1000000, &(0x7f0000000400)={[{@session={'session', 0x3d, 0x5}}, {@umask={'umask', 0x3d, 0x1}}, {@nls={'nls', 0x3d, 'macgreek'}}, {@part={'part', 0x3d, 0xc634}}, {@type={'type', 0x3d, "68aa78ea"}}, {@part={'part', 0x3d, 0x100}}, {@nls={'nls', 0x3d, 'cp737'}}, {@decompose='decompose'}], [{@obj_type={'obj_type', 0x3d, 'jfs\x00'}}, {@subj_role={'subj_role', 0x3d, 'jfs\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, 'jfs\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:34:54 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2800}}}}}}}}}, 0x0) 03:34:54 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x200000000, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80000) inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x8007ffffffe) write$ppp(r0, &(0x7f0000000100)="04419e2781ce7ee49586f98bc314fd6e90857ac66cc4764ef34d9a9131cb594cc7f27bed1eb08dc61fdc203b8162c6d7a57c5166451eb2dd5194c8162f3cfe35ada519d5b61bbb234f331312642c06e143b1c5d0170ef63f92fed6f2f91e1fa3a80c16eaca7e5c23d2a68090cfd6580aface00b42bdd36524627bf763f3d850e404455d1534b857eca0ed6e6a0d450769477f3345cdf43ef49228e435f85b0d7d4e2f39703d8ebe75ba746e7cc90c90d73b0255d", 0xb4) [ 965.887562][T14610] RDX: 00007f0611a0cad0 RSI: 0000000020000200 RDI: 00007f0611a0caf0 [ 965.895537][T14610] RBP: 0000000020000200 R08: 00007f0611a0cb30 R09: 00007f0611a0cad0 [ 965.903507][T14610] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000000000004 [ 965.911546][T14610] R13: 0000000000000020 R14: 00000000004dbc78 R15: 0000000000000003 03:34:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xb600000000000000}) 03:34:54 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3000}}}}}}}}}, 0x0) 03:34:54 executing program 5 (fault-call:2 fault-nth:32): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) [ 966.064649][T14624] EXT4-fs (sda1): Unrecognized mount option "debug_waŽt_extra_isize=0x0000000000000000" or missing value 03:34:54 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3580}}}}}}}}}, 0x0) 03:34:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xb8ffffff00000000}) 03:34:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_wan\n_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) [ 966.232771][T14633] hfsplus: unable to change nls mapping [ 966.238504][T14633] hfsplus: unable to parse mount options [ 966.295631][T14643] FAULT_INJECTION: forcing a failure. [ 966.295631][T14643] name failslab, interval 1, probability 0, space 0, times 0 [ 966.320013][T14643] CPU: 0 PID: 14643 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 966.329054][T14643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 966.329061][T14643] Call Trace: [ 966.329094][T14643] dump_stack+0x172/0x1f0 [ 966.329114][T14643] should_fail.cold+0xa/0x15 [ 966.351310][T14643] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 966.351328][T14643] ? ___might_sleep+0x163/0x280 [ 966.362116][T14643] __should_failslab+0x121/0x190 [ 966.362134][T14643] should_failslab+0x9/0x14 [ 966.362148][T14643] kmem_cache_alloc_trace+0x2d1/0x760 [ 966.362165][T14643] ? kasan_check_read+0x11/0x20 [ 966.362184][T14643] legacy_init_fs_context+0x48/0xe0 [ 966.371570][T14643] ? generic_parse_monolithic+0x200/0x200 03:34:55 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f00}}}}}}}}}, 0x0) 03:34:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xc800002000000000}) [ 966.371583][T14643] alloc_fs_context+0x365/0x640 [ 966.371600][T14643] fs_context_for_reconfigure+0x73/0x90 [ 966.371613][T14643] do_mount+0x8ba/0x2c40 [ 966.371629][T14643] ? copy_mount_string+0x40/0x40 [ 966.371653][T14643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 966.381814][T14643] ? copy_mount_options+0x280/0x3a0 [ 966.381831][T14643] ksys_mount+0xdb/0x150 [ 966.381845][T14643] __x64_sys_mount+0xbe/0x150 [ 966.381862][T14643] do_syscall_64+0x103/0x610 [ 966.381876][T14643] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 966.381885][T14643] RIP: 0033:0x45a89a [ 966.381897][T14643] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 966.381904][T14643] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 966.381919][T14643] RAX: ffffffffffffffda RBX: 00007f0611a0cb30 RCX: 000000000045a89a [ 966.392786][T14643] RDX: 00007f0611a0cad0 RSI: 0000000020000200 RDI: 00007f0611a0caf0 [ 966.392796][T14643] RBP: 0000000020000200 R08: 00007f0611a0cb30 R09: 00007f0611a0cad0 [ 966.392803][T14643] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000000000004 [ 966.392810][T14643] R13: 0000000000000020 R14: 00000000004dbc78 R15: 0000000000000003 03:34:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xfbffffff00000000}) 03:34:55 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000001240)='/dev/adsp#\x00', 0x8, 0x8000) getpeername$tipc(r0, &(0x7f0000001280)=@name, &(0x7f00000012c0)=0x10) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x803, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000000)=0x4) sendmsg$nfc_llcp(r0, &(0x7f00000016c0)={&(0x7f0000001300)={0x27, 0x1, 0x0, 0x7, 0x8, 0x3, "f64d7396163aef06af6a5f4e835ee67f0d565ee63b3f3a828b1e989f9a216d1a3eb00df86c8037eff774c4b3f9a7c2789912864c5db488740d37d3565e647e", 0x24}, 0x60, &(0x7f0000001580)=[{&(0x7f0000001380)="296adda7083c47b0763d85396a40b0db2f20278e3deb926ca6cf2b9284fc276c421955fefacaa262c3724dc3b259fa79d88bc5a501", 0x35}, {&(0x7f00000013c0)="7e32f224e32181686c7e2d90fd20681f73e388e89e24df5609ef4c12fe66292d79859ff0324886a366684b953b191d8621c5ff694055cb1817a70a4ca88b391987658d9332aadccfb5ac7438f9273cc32f84d3edb7728eee96ad06ed875c39aa2421d0dda957736400daa80b8a37ed37cb1f03551038b70f1dc3f1b2c344fc0aff6e7d050c2683087833afe4865c5da2d21e0ec4a00b38fd85c10aa7069b8a61764decce7ba305939afd9cac53997ab9bfe8c589721eceb177fcc5a00eb1f384ec057985ff07ea6c1ae37f82739961d2af6680f257820d384c", 0xd9}, {&(0x7f00000014c0)="246247191d70ab326a353cb2bc5ecb0b1193f80d97e90232b9d6b3880566e8d86d15710d515baecb1fcfaaf81da88699240ef659594ccd77deb95e441ea18a304c7b65443302b73b62ef0ecafdd5b81320b912603f7a41247be7ed2739d0d11d0ea590c242a9f5372a79a0e035eacd0ee310960ad2daf648c2c35c0ad1f40af906cd817309a85fbaede538ec41", 0x8d}], 0x3, &(0x7f00000015c0)={0xe8, 0x13f, 0x3d, "17e6ff983c6cd805fb013a8dfa7a8162efe01a31f2818e591096d54e8796397da0cc8e16479ad1625c125827fa0a34becc9b4328e753ebb1e731ea468a7315b1bc6daedb754af1d58f6c6f29be81286a90e56a4474f9577a2760c8a125c880b0a475d0e72f770d9f6d2f5db6d0909733223be38349835858f2375003d5d7d429780abc1e8b648ecfd8faa67e8aac2fc7df81ebf362cec1d9cfbc03f325095d9c24c3e7b2fb7253e57bb9821eef87affb48936d942bdb81b83c227c13cb3eea2563f5feb226b82f6b0dc621a35330408fcecce8b10854358f"}, 0xe8, 0x10}, 0x40000) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x8, 0x220882) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000100)={r2, &(0x7f0000000180)="23ce826e1ba76aee973b7e5c1d51fea3d0fbd37f0ddae07fcd9b84bad63cc3b6340b03bb7e44db148fd3b27950eaeaa7cbc8c70ebbab361101bc858ab4a5a0966a69d2796977a5bb872f37c0394b151dd2250497680ad0b95390bb2f90b22e023f5e85ced459364579dbe6002dc65e53f0df60b6ad3adae41c86e391487111a6d83d3df30d047ea039dcfee47dc2c271452cef676dad8484", &(0x7f0000000240)=""/4096}, 0x18) 03:34:55 executing program 2: socket$netlink(0x10, 0x3, 0x7) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:34:55 executing program 5 (fault-call:2 fault-nth:33): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) [ 966.637039][T14653] EXT4-fs (sda1): Unrecognized mount option "debug_wan [ 966.637039][T14653] _extra_isize=0x0000000000000000" or missing value 03:34:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xfdfdffff00000000}) 03:34:55 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4305}}}}}}}}}, 0x0) 03:34:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_wan%_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) [ 966.756804][T14670] FAULT_INJECTION: forcing a failure. [ 966.756804][T14670] name failslab, interval 1, probability 0, space 0, times 0 [ 966.783561][T14670] CPU: 0 PID: 14670 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 966.792751][T14670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 966.792757][T14670] Call Trace: [ 966.792781][T14670] dump_stack+0x172/0x1f0 [ 966.792802][T14670] should_fail.cold+0xa/0x15 [ 966.792822][T14670] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 966.792838][T14670] ? ___might_sleep+0x163/0x280 [ 966.792859][T14670] __should_failslab+0x121/0x190 [ 966.792880][T14670] should_failslab+0x9/0x14 [ 966.810574][T14670] __kmalloc_track_caller+0x2d8/0x740 [ 966.810596][T14670] ? ext4_remount+0xe3/0x2190 [ 966.845205][T14670] kstrdup+0x3a/0x70 [ 966.849112][T14670] ? ext4_register_li_request+0x7f0/0x7f0 [ 966.855279][T14670] ext4_remount+0xe3/0x2190 [ 966.859785][T14670] ? lock_downgrade+0x880/0x880 [ 966.864627][T14670] ? lock_downgrade+0x880/0x880 [ 966.869471][T14670] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 966.875793][T14670] ? do_raw_spin_unlock+0x57/0x270 [ 966.881017][T14670] ? ext4_register_li_request+0x7f0/0x7f0 [ 966.886728][T14670] ? shrink_dentry_list+0x319/0x720 [ 966.891926][T14670] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 966.897643][T14670] ? find_next_bit+0x107/0x130 [ 966.902410][T14670] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 966.908640][T14670] ? shrink_dcache_sb+0x224/0x270 [ 966.913673][T14670] ? shrink_dentry_list+0x720/0x720 [ 966.918869][T14670] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 966.925107][T14670] ? apparmor_capable+0x2ed/0x630 [ 966.930125][T14670] ? cap_capable+0x205/0x270 [ 966.934716][T14670] ? ext4_register_li_request+0x7f0/0x7f0 [ 966.940429][T14670] legacy_reconfigure+0x113/0x170 [ 966.945455][T14670] reconfigure_super+0x2d0/0x900 [ 966.950393][T14670] ? fs_umode_to_dtype+0xb0/0xb0 [ 966.955348][T14670] do_mount+0x1650/0x2c40 [ 966.959680][T14670] ? copy_mount_string+0x40/0x40 [ 966.964614][T14670] ? _copy_from_user+0xdd/0x150 [ 966.969464][T14670] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 966.975697][T14670] ? copy_mount_options+0x280/0x3a0 [ 966.980890][T14670] ksys_mount+0xdb/0x150 [ 966.985128][T14670] __x64_sys_mount+0xbe/0x150 [ 966.989802][T14670] do_syscall_64+0x103/0x610 [ 966.994414][T14670] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 967.000294][T14670] RIP: 0033:0x45a89a [ 967.004182][T14670] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 967.023778][T14670] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 967.032180][T14670] RAX: ffffffffffffffda RBX: 00007f0611a0cb30 RCX: 000000000045a89a [ 967.040259][T14670] RDX: 00007f0611a0cad0 RSI: 0000000020000200 RDI: 00007f0611a0caf0 [ 967.048318][T14670] RBP: 0000000020000200 R08: 00007f0611a0cb30 R09: 00007f0611a0cad0 03:34:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x2}) 03:34:55 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4788}}}}}}}}}, 0x0) [ 967.056376][T14670] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000000000004 [ 967.064341][T14670] R13: 0000000000000020 R14: 00000000004dbc78 R15: 0000000000000003 03:34:55 executing program 2: syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfffffe0d, 0x0, 0x0, 0x0) membarrier(0x50, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) 03:34:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x4}) 03:34:55 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4800}}}}}}}}}, 0x0) 03:34:55 executing program 5 (fault-call:2 fault-nth:34): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:55 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0xc040, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4a, 0x10000) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f00000000c0)={0x2, 0xffffffffffffffdf, 0x80000000000000, 0x2, 0x9, 0xfbc0}) r2 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0xfffffffffffffa2a, 0x20000) getsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000001c0), &(0x7f0000000180)=0x171) setsockopt$inet_mreqsrc(r0, 0x0, 0x2d, &(0x7f0000000200)={@loopback, @loopback, @broadcast}, 0xc) [ 967.229175][T14684] EXT4-fs (sda1): Unrecognized mount option "debug_wan%_extra_isize=0x0000000000000000" or missing value 03:34:55 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x200, 0x0) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x1) 03:34:55 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4888}}}}}}}}}, 0x0) 03:34:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x9}) 03:34:56 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6000}}}}}}}}}, 0x0) [ 967.380472][T14702] EXT4-fs (sda1): Unrecognized mount option "debug_wan%_extra_isize=0x0000000000000000" or missing value 03:34:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_wan\x8e_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xd}) 03:34:56 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6488}}}}}}}}}, 0x0) 03:34:56 executing program 0: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@initdev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@empty}}, &(0x7f0000000340)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000380)={@remote, 0x2f, r0}) 03:34:56 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x800e}}}}}}}}}, 0x0) 03:34:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x10}) [ 967.581891][T14695] FAULT_INJECTION: forcing a failure. [ 967.581891][T14695] name failslab, interval 1, probability 0, space 0, times 0 [ 967.598088][T14695] CPU: 1 PID: 14695 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 967.607109][T14695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 967.617154][T14695] Call Trace: [ 967.620442][T14695] dump_stack+0x172/0x1f0 [ 967.624790][T14695] should_fail.cold+0xa/0x15 [ 967.629381][T14695] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 967.635189][T14695] ? ___might_sleep+0x163/0x280 [ 967.640041][T14695] __should_failslab+0x121/0x190 [ 967.644976][T14695] should_failslab+0x9/0x14 [ 967.649472][T14695] kmem_cache_alloc_trace+0x2d1/0x760 [ 967.654858][T14695] kobject_uevent_env+0x2fb/0x1030 [ 967.660079][T14695] kobject_uevent+0x20/0x26 [ 967.664578][T14695] __loop_clr_fd+0x4ee/0xd60 [ 967.669168][T14695] lo_ioctl+0x210/0x2150 [ 967.673438][T14695] ? tomoyo_domain+0xc5/0x160 [ 967.678243][T14695] ? lo_rw_aio+0x1120/0x1120 [ 967.682823][T14695] blkdev_ioctl+0xee8/0x1c40 [ 967.687408][T14695] ? blkpg_ioctl+0xa90/0xa90 [ 967.691995][T14695] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 967.697830][T14695] ? __fget+0x35a/0x550 [ 967.701986][T14695] block_ioctl+0xee/0x130 [ 967.706303][T14695] ? blkdev_fallocate+0x410/0x410 [ 967.711319][T14695] do_vfs_ioctl+0xd6e/0x1390 [ 967.715902][T14695] ? ioctl_preallocate+0x210/0x210 [ 967.721045][T14695] ? __fget+0x381/0x550 [ 967.725198][T14695] ? ksys_dup3+0x3e0/0x3e0 [ 967.729616][T14695] ? kfree+0x173/0x230 [ 967.733695][T14695] ? kfree+0x173/0x230 [ 967.737762][T14695] ? tomoyo_file_ioctl+0x23/0x30 [ 967.742690][T14695] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 967.748921][T14695] ? security_file_ioctl+0x93/0xc0 [ 967.754020][T14695] ksys_ioctl+0xab/0xd0 [ 967.758164][T14695] __x64_sys_ioctl+0x73/0xb0 [ 967.762749][T14695] do_syscall_64+0x103/0x610 [ 967.767330][T14695] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 967.773218][T14695] RIP: 0033:0x457c97 [ 967.777114][T14695] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 967.796703][T14695] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 967.805117][T14695] RAX: ffffffffffffffda RBX: 00007f0611a0cb30 RCX: 0000000000457c97 [ 967.813092][T14695] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 967.821050][T14695] RBP: 0000000020000200 R08: 00007f0611a0cb30 R09: 00007f0611a0cad0 [ 967.829006][T14695] R10: 0000000000000020 R11: 0000000000000246 R12: 0000000000000004 [ 967.836968][T14695] R13: 0000000000000020 R14: 00000000004dbc78 R15: 0000000000000003 03:34:56 executing program 5 (fault-call:2 fault-nth:35): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x1b}) 03:34:56 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000000c0)={0x7, 0x0, 0x1, 0x80000000}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000100)={0x27ca, r1}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12000, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 03:34:56 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x800, 0x0) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f00000000c0)=0x7) 03:34:56 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8035}}}}}}}}}, 0x0) 03:34:56 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8100}}}}}}}}}, 0x0) [ 968.062963][T14735] FAULT_INJECTION: forcing a failure. [ 968.062963][T14735] name failslab, interval 1, probability 0, space 0, times 0 [ 968.104921][T14735] CPU: 1 PID: 14735 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 968.114079][T14735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 968.124136][T14735] Call Trace: [ 968.127435][T14735] dump_stack+0x172/0x1f0 [ 968.131766][T14735] should_fail.cold+0xa/0x15 [ 968.136357][T14735] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 968.142166][T14735] ? ___might_sleep+0x163/0x280 [ 968.147032][T14735] __should_failslab+0x121/0x190 [ 968.151967][T14735] should_failslab+0x9/0x14 [ 968.156469][T14735] __kmalloc_track_caller+0x2d8/0x740 [ 968.161850][T14735] ? lockref_put_or_lock+0x6f/0x90 [ 968.167043][T14735] ? ext4_remount+0xe3/0x2190 [ 968.171727][T14735] kstrdup+0x3a/0x70 [ 968.175723][T14735] ? ext4_register_li_request+0x7f0/0x7f0 [ 968.181553][T14735] ext4_remount+0xe3/0x2190 [ 968.186053][T14735] ? lock_downgrade+0x880/0x880 [ 968.190992][T14735] ? kasan_check_read+0x11/0x20 [ 968.195842][T14735] ? _raw_spin_unlock+0x2d/0x50 [ 968.200684][T14735] ? ext4_register_li_request+0x7f0/0x7f0 [ 968.206488][T14735] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 968.212744][T14735] ? shrink_dentry_list+0x319/0x720 [ 968.217935][T14735] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 968.223658][T14735] ? find_next_bit+0x107/0x130 [ 968.228416][T14735] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 968.234646][T14735] ? shrink_dcache_sb+0x224/0x270 [ 968.239663][T14735] ? shrink_dentry_list+0x720/0x720 [ 968.244875][T14735] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 968.251107][T14735] ? apparmor_capable+0x2ed/0x630 [ 968.256138][T14735] ? cap_capable+0x205/0x270 [ 968.260725][T14735] ? ext4_register_li_request+0x7f0/0x7f0 [ 968.266453][T14735] legacy_reconfigure+0x113/0x170 [ 968.271478][T14735] reconfigure_super+0x2d0/0x900 [ 968.276414][T14735] ? fs_umode_to_dtype+0xb0/0xb0 [ 968.281348][T14735] do_mount+0x1650/0x2c40 [ 968.285797][T14735] ? copy_mount_string+0x40/0x40 [ 968.290754][T14735] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 968.296983][T14735] ? copy_mount_options+0x280/0x3a0 [ 968.302179][T14735] ksys_mount+0xdb/0x150 [ 968.306478][T14735] __x64_sys_mount+0xbe/0x150 [ 968.311156][T14735] do_syscall_64+0x103/0x610 [ 968.315750][T14735] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 968.321630][T14735] RIP: 0033:0x45a89a [ 968.325531][T14735] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 968.345145][T14735] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 968.353555][T14735] RAX: ffffffffffffffda RBX: 00007f0611a0cb30 RCX: 000000000045a89a [ 968.361521][T14735] RDX: 00007f0611a0cad0 RSI: 0000000020000200 RDI: 00007f0611a0caf0 [ 968.369483][T14735] RBP: 0000000020000200 R08: 00007f0611a0cb30 R09: 00007f0611a0cad0 [ 968.377442][T14735] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000000000004 [ 968.385403][T14735] R13: 0000000000000020 R14: 00000000004dbc78 R15: 0000000000000003 [ 968.405907][T14741] EXT4-fs: 1 callbacks suppressed [ 968.405918][T14741] EXT4-fs (sda1): Unrecognized mount option "debug_wanŽ_extra_isize=0x0000000000000000" or missing value 03:34:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want\nextra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x1d}) 03:34:57 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8847}}}}}}}}}, 0x0) 03:34:57 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x1000000000080000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4002000}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x178, r1, 0x4, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x10, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}]}]}, @TIPC_NLA_MEDIA={0xb8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5c899ba7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5b7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2093}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x100000000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6ca}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}]}, @TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7fff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x101}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x178}}, 0x8000) 03:34:57 executing program 5 (fault-call:2 fault-nth:36): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x37}) 03:34:57 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8848}}}}}}}}}, 0x0) 03:34:57 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x100) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x400, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000080)={0x2, r1}) 03:34:57 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:34:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xb6}) 03:34:57 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8864}}}}}}}}}, 0x0) [ 968.722083][T14767] EXT4-fs (sda1): Unrecognized mount option "debug_want [ 968.722083][T14767] extra_isize=0x0000000000000000" or missing value [ 968.761780][T14765] FAULT_INJECTION: forcing a failure. 03:34:57 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x8000, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f00000000c0)={0x0, 0x0, [], @bt={0x9, 0x7f, 0x8, 0x7, 0x3ff, 0x5, 0x8, 0xf}}) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000180)={0xd, 0x19, 0xa, 0x1, 0x5, 0x6, 0x1, 0x112, 0xffffffffffffffff}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 968.761780][T14765] name failslab, interval 1, probability 0, space 0, times 0 [ 968.792363][T14765] CPU: 0 PID: 14765 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 968.801409][T14765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 968.811477][T14765] Call Trace: [ 968.814779][T14765] dump_stack+0x172/0x1f0 [ 968.819111][T14765] should_fail.cold+0xa/0x15 [ 968.823729][T14765] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 968.829530][T14765] ? ___might_sleep+0x163/0x280 [ 968.834391][T14765] __should_failslab+0x121/0x190 [ 968.839383][T14765] should_failslab+0x9/0x14 [ 968.843884][T14765] __kmalloc+0x2dc/0x740 [ 968.848144][T14765] ? kobject_uevent_env+0x2fb/0x1030 [ 968.853446][T14765] ? rcu_read_lock_sched_held+0x110/0x130 [ 968.859156][T14765] ? kobject_get_path+0xc4/0x1b0 [ 968.864100][T14765] kobject_get_path+0xc4/0x1b0 [ 968.868885][T14765] kobject_uevent_env+0x31f/0x1030 [ 968.874007][T14765] kobject_uevent+0x20/0x26 [ 968.878507][T14765] __loop_clr_fd+0x4ee/0xd60 [ 968.883096][T14765] lo_ioctl+0x210/0x2150 [ 968.887336][T14765] ? tomoyo_domain+0xc5/0x160 [ 968.892021][T14765] ? lo_rw_aio+0x1120/0x1120 [ 968.896611][T14765] blkdev_ioctl+0xee8/0x1c40 [ 968.901210][T14765] ? blkpg_ioctl+0xa90/0xa90 [ 968.905811][T14765] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 968.911623][T14765] ? __fget+0x35a/0x550 [ 968.915785][T14765] block_ioctl+0xee/0x130 [ 968.920109][T14765] ? blkdev_fallocate+0x410/0x410 [ 968.925139][T14765] do_vfs_ioctl+0xd6e/0x1390 [ 968.929735][T14765] ? ioctl_preallocate+0x210/0x210 [ 968.934852][T14765] ? __fget+0x381/0x550 [ 968.939007][T14765] ? ksys_dup3+0x3e0/0x3e0 [ 968.943507][T14765] ? kfree+0x173/0x230 [ 968.947566][T14765] ? kfree+0x173/0x230 [ 968.951637][T14765] ? tomoyo_file_ioctl+0x23/0x30 [ 968.956572][T14765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 968.962901][T14765] ? security_file_ioctl+0x93/0xc0 [ 968.968014][T14765] ksys_ioctl+0xab/0xd0 [ 968.972172][T14765] __x64_sys_ioctl+0x73/0xb0 [ 968.976760][T14765] do_syscall_64+0x103/0x610 [ 968.981350][T14765] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 968.987232][T14765] RIP: 0033:0x457c97 [ 968.991137][T14765] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 969.010879][T14765] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 969.019283][T14765] RAX: ffffffffffffffda RBX: 00007f0611a0cb30 RCX: 0000000000457c97 [ 969.027248][T14765] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 969.035241][T14765] RBP: 0000000020000200 R08: 00007f0611a0cb30 R09: 00007f0611a0cad0 [ 969.043215][T14765] R10: 0000000000000020 R11: 0000000000000246 R12: 0000000000000004 [ 969.051224][T14765] R13: 0000000000000020 R14: 00000000004dbc78 R15: 0000000000000003 03:34:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want\x8eextra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x900}) 03:34:57 executing program 5 (fault-call:2 fault-nth:37): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:57 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8906}}}}}}}}}, 0x0) 03:34:57 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000001a80)='./file0\x00', 0x4, 0xf0, 0x0, 0xfffffffffffffffe, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, r1, 0x0, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x902}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, [], 0xc}}]}, 0x68}, 0x1, 0x0, 0x0, 0x20000000}, 0x4004800) recvmmsg(r0, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000240)=""/204, 0xcc}, {&(0x7f0000000340)=""/115, 0x73}, {&(0x7f00000003c0)=""/118, 0x76}], 0x3, &(0x7f0000000480)=""/255, 0xff}, 0x1}, {{&(0x7f0000000580)=@tipc=@id, 0x80, &(0x7f0000000680)=[{&(0x7f0000000600)=""/99, 0x63}], 0x1, &(0x7f00000006c0)=""/4096, 0x1000}, 0x7}, {{&(0x7f00000016c0), 0x80, &(0x7f0000001ac0)=[{&(0x7f0000001740)=""/50, 0x32}, {&(0x7f0000001780)=""/252, 0xfc}, {&(0x7f0000001880)=""/78, 0x4e}, {&(0x7f0000001900)=""/223, 0xdf}, {&(0x7f0000001a00)=""/87, 0x57}, {&(0x7f0000001a80)}], 0x6, &(0x7f0000001b40)=""/108, 0x6c}, 0x93d}, {{&(0x7f0000001bc0), 0x80, &(0x7f0000001f80)=[{&(0x7f0000001c40)=""/167, 0xa7}, {&(0x7f0000001d00)=""/220, 0xdc}, {&(0x7f0000001e00)=""/205, 0xcd}, {&(0x7f0000001f00)=""/55, 0x37}, {&(0x7f0000001f40)=""/17, 0x11}], 0x5, &(0x7f0000002000)=""/59, 0x3b}, 0x9}, {{&(0x7f0000002040)=@alg, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)=""/237, 0xed}, {&(0x7f00000021c0)=""/247, 0xf7}, {&(0x7f00000022c0)=""/70, 0x46}, {&(0x7f0000002340)=""/185, 0xb9}], 0x4, &(0x7f0000002440)=""/64, 0x40}, 0x8}], 0x5, 0x10042, &(0x7f00000025c0)={0x77359400}) 03:34:57 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xf000}}}}}}}}}, 0x0) 03:34:58 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)) 03:34:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xd00}) [ 969.362519][T14797] EXT4-fs (sda1): Unrecognized mount option "debug_wantŽextra_isize=0x0000000000000000" or missing value [ 969.402012][T14790] FAULT_INJECTION: forcing a failure. [ 969.402012][T14790] name failslab, interval 1, probability 0, space 0, times 0 [ 969.441400][T14790] CPU: 0 PID: 14790 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 969.450648][T14790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 969.460703][T14790] Call Trace: [ 969.464008][T14790] dump_stack+0x172/0x1f0 [ 969.468342][T14790] should_fail.cold+0xa/0x15 [ 969.472944][T14790] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 969.478758][T14790] ? ___might_sleep+0x163/0x280 [ 969.483662][T14790] __should_failslab+0x121/0x190 [ 969.488603][T14790] should_failslab+0x9/0x14 [ 969.493105][T14790] kmem_cache_alloc_node+0x264/0x710 [ 969.498385][T14790] ? find_held_lock+0x35/0x130 [ 969.503168][T14790] __alloc_skb+0xd5/0x5e0 [ 969.507496][T14790] ? skb_trim+0x190/0x190 [ 969.511824][T14790] ? kasan_check_read+0x11/0x20 [ 969.516692][T14790] alloc_uevent_skb+0x83/0x1e2 [ 969.521466][T14790] kobject_uevent_env+0xa63/0x1030 [ 969.526589][T14790] kobject_uevent+0x20/0x26 [ 969.531088][T14790] __loop_clr_fd+0x4ee/0xd60 [ 969.535678][T14790] lo_ioctl+0x210/0x2150 [ 969.539917][T14790] ? tomoyo_domain+0xc5/0x160 [ 969.544679][T14790] ? lo_rw_aio+0x1120/0x1120 [ 969.549274][T14790] blkdev_ioctl+0xee8/0x1c40 [ 969.553874][T14790] ? blkpg_ioctl+0xa90/0xa90 [ 969.558467][T14790] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 969.564291][T14790] ? __fget+0x35a/0x550 [ 969.568448][T14790] block_ioctl+0xee/0x130 [ 969.572775][T14790] ? blkdev_fallocate+0x410/0x410 [ 969.577797][T14790] do_vfs_ioctl+0xd6e/0x1390 [ 969.582385][T14790] ? ioctl_preallocate+0x210/0x210 [ 969.587508][T14790] ? __fget+0x381/0x550 [ 969.591665][T14790] ? ksys_dup3+0x3e0/0x3e0 [ 969.596087][T14790] ? kfree+0x173/0x230 [ 969.600152][T14790] ? kfree+0x173/0x230 [ 969.604238][T14790] ? tomoyo_file_ioctl+0x23/0x30 [ 969.609191][T14790] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 969.615424][T14790] ? security_file_ioctl+0x93/0xc0 [ 969.620528][T14790] ksys_ioctl+0xab/0xd0 [ 969.624686][T14790] __x64_sys_ioctl+0x73/0xb0 [ 969.629279][T14790] do_syscall_64+0x103/0x610 [ 969.633867][T14790] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 969.639750][T14790] RIP: 0033:0x457c97 [ 969.643639][T14790] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 969.663234][T14790] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 969.671634][T14790] RAX: ffffffffffffffda RBX: 00007f0611a0cb30 RCX: 0000000000457c97 [ 969.679617][T14790] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 03:34:58 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x800, 0x2) ioctl$RTC_AIE_ON(r0, 0x7001) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x0, 0x2) setsockopt$inet_dccp_buf(r1, 0x21, 0x80, &(0x7f00000000c0)="c510fcc52c851754fbfecb505416547d109aba6228a5a151b5b0aa039169f46e6ac01420215de9b910a1b32f53fea24e0ea8fd3fe363f44bdc6c88746c257692ce67c7ae9ba570c0c2dc61a45bedbdf6e70c8a7ca6337d8663ad3a1db0cb93632b5c97840a775ef856b9bf4f03bfcec3aaba5c9e867eceb2e337380c70422eca2e3b10dd89199be6c70086b39167f2def77d8325f37bb6b5bdefa364c9d68e29", 0xa0) 03:34:58 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xf0ffff}}}}}}}}}, 0x0) [ 969.687582][T14790] RBP: 0000000020000200 R08: 00007f0611a0cb30 R09: 00007f0611a0cad0 [ 969.695549][T14790] R10: 0000000000000020 R11: 0000000000000246 R12: 0000000000000004 [ 969.703510][T14790] R13: 0000000000000020 R14: 00000000004dbc78 R15: 0000000000000003 03:34:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x1470}) 03:34:58 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1000000}}}}}}}}}, 0x0) 03:34:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_\nxtra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:58 executing program 5 (fault-call:2 fault-nth:38): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x1b00}) 03:34:58 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2000000}}}}}}}}}, 0x0) 03:34:58 executing program 2: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f00000000c0)={0x1ff, 0x3, 0x5}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6b3, 0x0, 0x0, 0x0) 03:34:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x1d00}) 03:34:58 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000}}}}}}}}}, 0x0) 03:34:58 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f00000000c0)={0x0, 0x0, [], @raw_data=[0x49cf, 0x1, 0x7, 0x2f1c000, 0x200, 0x3ff, 0x7, 0x3, 0x7, 0x3, 0x81, 0x400, 0x6fc2d5c4, 0x7fffffff, 0x8d, 0x7314, 0xa67b, 0xdc, 0x1, 0x1000, 0x3, 0x1, 0x3, 0x17, 0x2, 0xcdf, 0xe5, 0x100000000, 0x8000, 0x10001, 0x401, 0x7fff]}) [ 969.991962][T14827] EXT4-fs (sda1): Unrecognized mount option "debug_want_ [ 969.991962][T14827] xtra_isize=0x0000000000000000" or missing value [ 970.051726][T14824] FAULT_INJECTION: forcing a failure. [ 970.051726][T14824] name failslab, interval 1, probability 0, space 0, times 0 [ 970.064419][T14824] CPU: 0 PID: 14824 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190301 #1 [ 970.073433][T14824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 970.083479][T14824] Call Trace: [ 970.086769][T14824] dump_stack+0x172/0x1f0 [ 970.091108][T14824] should_fail.cold+0xa/0x15 [ 970.095703][T14824] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 970.101507][T14824] ? ___might_sleep+0x163/0x280 [ 970.106452][T14824] __should_failslab+0x121/0x190 [ 970.111383][T14824] should_failslab+0x9/0x14 [ 970.115898][T14824] kmem_cache_alloc_node+0x264/0x710 [ 970.121176][T14824] ? find_held_lock+0x35/0x130 [ 970.125941][T14824] __alloc_skb+0xd5/0x5e0 [ 970.130266][T14824] ? skb_trim+0x190/0x190 [ 970.134598][T14824] ? kasan_check_read+0x11/0x20 [ 970.139448][T14824] alloc_uevent_skb+0x83/0x1e2 [ 970.144230][T14824] kobject_uevent_env+0xa63/0x1030 [ 970.149345][T14824] kobject_uevent+0x20/0x26 [ 970.153856][T14824] __loop_clr_fd+0x4ee/0xd60 [ 970.158446][T14824] lo_ioctl+0x210/0x2150 [ 970.162690][T14824] ? tomoyo_domain+0xc5/0x160 [ 970.167452][T14824] ? lo_rw_aio+0x1120/0x1120 [ 970.172044][T14824] blkdev_ioctl+0xee8/0x1c40 [ 970.176629][T14824] ? blkpg_ioctl+0xa90/0xa90 [ 970.181222][T14824] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 970.187048][T14824] ? __fget+0x35a/0x550 [ 970.191236][T14824] block_ioctl+0xee/0x130 [ 970.195566][T14824] ? blkdev_fallocate+0x410/0x410 [ 970.200591][T14824] do_vfs_ioctl+0xd6e/0x1390 [ 970.205198][T14824] ? ioctl_preallocate+0x210/0x210 [ 970.210406][T14824] ? __fget+0x381/0x550 [ 970.214564][T14824] ? ksys_dup3+0x3e0/0x3e0 [ 970.218971][T14824] ? kfree+0x173/0x230 [ 970.223031][T14824] ? kfree+0x173/0x230 [ 970.227094][T14824] ? tomoyo_file_ioctl+0x23/0x30 [ 970.232063][T14824] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 970.238316][T14824] ? security_file_ioctl+0x93/0xc0 [ 970.243425][T14824] ksys_ioctl+0xab/0xd0 [ 970.247578][T14824] __x64_sys_ioctl+0x73/0xb0 [ 970.252166][T14824] do_syscall_64+0x103/0x610 [ 970.256748][T14824] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 970.262714][T14824] RIP: 0033:0x457c97 [ 970.266600][T14824] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 970.286226][T14824] RSP: 002b:00007f0611a0ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 970.294640][T14824] RAX: ffffffffffffffda RBX: 00007f0611a0cb30 RCX: 0000000000457c97 [ 970.302691][T14824] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 970.310743][T14824] RBP: 0000000020000200 R08: 00007f0611a0cb30 R09: 00007f0611a0cad0 [ 970.318721][T14824] R10: 0000000000000020 R11: 0000000000000246 R12: 0000000000000004 [ 970.326683][T14824] R13: 0000000000000020 R14: 00000000004dbc78 R15: 0000000000000003 03:34:59 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x3) 03:34:59 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8060000}}}}}}}}}, 0x0) 03:34:59 executing program 5 (fault-call:2 fault-nth:39): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x2000}) [ 970.421899][T14845] EXT4-fs (sda1): Unrecognized mount option "debug_want_ [ 970.421899][T14845] xtra_isize=0x0000000000000000" or missing value 03:34:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_%xtra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x3700}) 03:34:59 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xd000000}}}}}}}}}, 0x0) 03:34:59 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x80000000, 0x0) r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x20000000000006, 0x1fff) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f00000000c0)={0x2, [0x0, 0x0]}) 03:34:59 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xd, 0x500) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x20000, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00', 0x7) 03:34:59 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20000000}}}}}}}}}, 0x0) 03:34:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x3f00}) 03:34:59 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x28000000}}}}}}}}}, 0x0) 03:34:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x4000}) 03:34:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) [ 970.804685][T14875] EXT4-fs (sda1): Unrecognized mount option "debug_want_%xtra_isize=0x0000000000000000" or missing value 03:34:59 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x30000000}}}}}}}}}, 0x0) 03:34:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x7014}) [ 971.032017][T14875] EXT4-fs (sda1): Unrecognized mount option "debug_want_%xtra_isize=0x0000000000000000" or missing value 03:34:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_\x8extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:34:59 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x404000, 0x3bb, 0x0, 0x2058840, 0x0) iopl(0x0) r0 = eventfd(0x44b098c2) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200400, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r1, 0x3f, 0x1ff, 0x3, 0x76}) 03:34:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xb600}) 03:34:59 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f000000}}}}}}}}}, 0x0) 03:34:59 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) mount$9p_xen(&(0x7f0000000000)='^\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x8002, &(0x7f0000000280)={'trans=xen,', {[{@uname={'uname', 0x3d, 'jfs\x00'}}, {@fscache='fscache'}, {@loose='loose'}, {@msize={'msize', 0x3d, 0x1}}, {@access_client='access=client'}, {@version_u='version=9p2000.u'}, {@mmap='mmap'}, {@dfltuid={'dfltuid', 0x3d, r0}}]}}) 03:34:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:34:59 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x80, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000001140)={&(0x7f0000000140)=""/4096, 0x12000, 0x800, 0x40}, 0x18) getsockname$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000100)=0x133) openat$kvm(0xffffffffffffff9c, &(0x7f0000001180)='/dev/kvm\x00', 0x8100, 0x0) 03:34:59 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x43050000}}}}}}}}}, 0x0) 03:34:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xd0000}) [ 971.340757][T14915] EXT4-fs (sda1): Unrecognized mount option "debug_want_Žxtra_isize=0x0000000000000000" or missing value 03:35:00 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x48000000}}}}}}}}}, 0x0) 03:35:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x100000}) [ 971.385575][T14927] 9pnet: Could not find request transport: xen 03:35:00 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000640)='./file0\x00', 0x1000000000000, 0xfe79, 0x0, 0x3, 0x0) r0 = add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000400)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000005c0)={r1, &(0x7f0000000440)="d59b78b28a35026359a122deabb8ca3a41b56921c071193939c4116f251255fe4f38d3336b12a0d688f39903f56d9ff3adb049fe11b29b7a34d4b2bdbfa9dcfbe1662fb2766522acc6b51439878ae20a6398876db0029ed94374ea2f858526739660b7e4c9fb10261daa446db854cfd5aa942a808501a8947729eb06a5cb2c7aeaf43022f668eb89df9395de812dcb7c97fb62cf36e31a7da5e2f2", &(0x7f0000000500)=""/190}, 0x18) r2 = syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x4, 0x80) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f00000003c0)=0x100000001) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r0, 0x3, 0x8}, &(0x7f0000000140)={'enc=', 'raw', ' hash=', {'sha512-arm64\x00'}}, &(0x7f00000001c0)="6de5f3e7", &(0x7f0000000200)=""/33) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={r0, 0x0, 0x8}, 0x0, &(0x7f0000000280)="d412a2d7e9f068368acc55eb78e2a779adcb2f52c55aa6dd0550b67589042d4bdca87fd87904dffc7d0eb9c8212a08ea8e96709ae477a0df07cdb18c4d522843f4abecb50dec58864bd748220122814ab61f59e32057527326905658a6d67fda214dfb1e901756eb11a93412c49a73", &(0x7f0000000300)=""/120) [ 971.636679][T14937] EXT4-fs (sda1): Unrecognized mount option "debug_want_Žxtra_isize=0x0000000000000000" or missing value 03:35:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_e\ntra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:00 executing program 2: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x0, 0x0, 0x100000001000000, 0x0) 03:35:00 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x60000000}}}}}}}}}, 0x0) 03:35:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x200000}) 03:35:00 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3bb, 0x0, 0x0, 0x0) 03:35:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x3, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:00 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x800e0000}}}}}}}}}, 0x0) 03:35:00 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3, 0x200) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video0\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000000c0)={{0x4, 0x9}, 'port1\x00', 0x10, 0x40000, 0xac17, 0x1f, 0x7fff, 0x2, 0x1, 0x0, 0x4, 0x3}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:35:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x1000000}) 03:35:00 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80350000}}}}}}}}}, 0x0) 03:35:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x2000000}) [ 971.934792][T14958] EXT4-fs (sda1): Unrecognized mount option "debug_want_e [ 971.934792][T14958] tra_isize=0x0000000000000000" or missing value 03:35:00 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) execve(&(0x7f0000000080)='./file1\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='ppp0\x00', &(0x7f0000000100)='cgroup\x00', &(0x7f0000000140)=')&lo/-\x00', &(0x7f0000000180)='jfs\x00'], &(0x7f0000000380)=[&(0x7f0000000200)='jfs\x00', &(0x7f0000000240)='jfs\x00', &(0x7f0000000280)='jfs\x00', &(0x7f00000002c0)='jfs\x00', &(0x7f0000000300)='jfs\x00', &(0x7f0000000340)='md5sum\x00']) 03:35:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_e\x8etra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x4000000}) 03:35:00 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r0 = socket(0x0, 0xa, 0x1) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000001440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x801000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001480)={0x30, r1, 0x100, 0x70bd28, 0x25dfdbfb, {{}, 0x0, 0x4108, 0x0, {0x14, 0x18, {0x100, @bearer=@udp='udp:syz1\x00'}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0x2a, "4f75e0478f097b26bcbc43d31418f1b69ec51a4fd2bfb5baa6a39bdba185d39cb6cee014347a3ff83d47"}, &(0x7f00000000c0)=0x32) bind$bt_rfcomm(r0, &(0x7f0000000140)={0x1f, {0xffffffffffffffff, 0x9, 0x8, 0x8, 0xbf, 0x3}, 0xffffffff}, 0xa) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={r2, 0x0, 0x3, 0x401, 0x8, 0x4}, 0x14) 03:35:00 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x81000000}}}}}}}}}, 0x0) 03:35:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x4, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:00 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x86ddffff}}}}}}}}}, 0x0) 03:35:00 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:35:00 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x88470000}}}}}}}}}, 0x0) 03:35:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x9000000}) 03:35:00 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x4, 0x98000) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x5) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x42) write$P9_RXATTRCREATE(r1, &(0x7f0000000100)={0xa90dcbc5, 0x21, 0x1}, 0x7) 03:35:01 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x88480000}}}}}}}}}, 0x0) 03:35:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xd000000}) 03:35:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_ex\nra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:01 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x6000, 0x0) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f00000000c0)={0x0, 0x0, @ioapic}) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)={0x0, 0x0}) syz_open_procfs(r1, &(0x7f0000000200)='net/icmp6\x00') 03:35:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x1b000000}) 03:35:01 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x88640000}}}}}}}}}, 0x0) 03:35:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x5, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x1d000000}) 03:35:01 executing program 2: syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x20000000000001, 0x0, 0x0, 0x0, 0x0) r0 = inotify_init() ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x80) 03:35:01 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff}}}}}}}}}, 0x0) 03:35:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x200000c8}) 03:35:01 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x88caffff}}}}}}}}}, 0x0) 03:35:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x37000000}) 03:35:01 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x0, 0x0, 0x2, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x3f, 0x5, &(0x7f0000000440)=[{&(0x7f0000000100)="3a76928a8cfcc1cff69267d8fd949ef25f333d443bd96581e7218d900cc47c3b8840ad74aa12fb6cc4b9df2791fce030e57bdbf46d2b1ae566d790556a32f28315bd6e099b339e2b53986335ab0b7cdf3100c65e45ee6c407f2c799b41caefa3917164fc5a6dce067b28624746662c74f1be6279f5d726373d10aa87f8030164f1ff1a2697a5fbd829", 0x89, 0x5}, {&(0x7f00000001c0)="bc89a9b9fb29f037fc976e9625e02db97037ca05ed7ab50b3d60937a0122741ba0da3ec41a0b081b0275be50cf8890116ba86d461937ce75cb8ebebd4a5ce328b5cebb4cd74ebc83da4ada39bc69370dad938f85cc8028110acce109db85d2b27f11d3ffeb3cedcf762b08823682f650f013dcfdc3cb5f7665e398d9ef6b17802cc184995fec503e5f6ab15ada54762c826c74f0a5fc7fa5001fd57cf222da5a6d72ebf4cd5670a95e2b8975ab6ce07d2146fb4a07d003c6d195088e89f75d42f9f504fd1217595be7976b784d9cc21ba54b4f991efaa913e41b081b201567a6717286997799660b4e", 0xe9, 0x200000000000000}, {&(0x7f00000002c0)="39460e", 0x3, 0xfffffffffffffff9}, {&(0x7f0000000300)="6e6f0110480a9eebae2e6df275d170a4dcef6f2d118f6684c658", 0x1a}, {&(0x7f0000000340)="8d07f8ac1b61c0b5b43ed74cf41321e0e2c0663635bcc2d3c7597ee3ac623de1aad07e154b8af2595e3dd05acce61742378da6fb585ee60e8f2f982fd99ea48e8a9bea2acb944c7fe6329d7fb2ff64a35d06efdd8b3de3e37226f8f8cbc4d22d1f03a63e695337d73e76543100e563bb01eed9583a2ca42aba43ae9c90194cee5df435474e6861c76801e162bdb81dcc9d13e56612aa74ae8db160b32be078e04963f4551c66e89eb801e55323f06f878098b88c7f91fad4e64fee4e6f690deb8e224ee3908a72847c903472ab14df9d51f0e61ee630ab73052a", 0xda}], 0x1080, &(0x7f0000000540)=ANY=[@ANYBLOB='discard,discard,grpquota,gid=', @ANYRESHEX, @ANYBLOB="2c6e6f646973636172642c6572726f72733d636f6e74696e75652c61707072616973655f747970653d696d617369670cf8"]) 03:35:01 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x80000000, 0x40002) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f0000000080)={{0x0, @addr=0x3}, 0x8, 0xfffffffffffff426, 0x285}) 03:35:01 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x89060000}}}}}}}}}, 0x0) 03:35:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_ex%ra_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x3f000000}) 03:35:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:01 executing program 2: pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file1\x00') syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file1\x00', 0x4, 0x4, &(0x7f0000000340)=[{&(0x7f0000000100)="eb40aa5c51bb83df61054c57863979c972b69f3e36d6b3b8ac5f113c", 0x1c, 0xffffffffffffff49}, {&(0x7f0000000140)="a4c974da13d23e1b434149a4ad8d4f740d587f5f3c267c70bf4c64dccba1ab2ec8273427d60d09e94c9b0edc2be7226d9ea4b50796a37d7f88c1406e5bf4e47f7b31c33e2bc0d4b6ead945aed136", 0x4e, 0xfffffffffffffffe}, {&(0x7f00000001c0)="980ef2b86395156b18b40195bb7db6b24e4956525917441b91d7d533ad3163fcbb0c1577f68e0e437616642ffe580214ab8c6ee56b4b2be0a54fa8f58cae6736e83404ddbccd0fe6220a12fc686e04a763dd8db8f38248b4590d562334d5fb655dd2a9ea035de6275b778fcdd066c6e21578b2c24e69ef55425b8fb68f3de69dc50652359b39d5e228ce4f2824fcd964913aa82a7d2240c6e5361cd28c8eacd18ae323e99b2e0450d9d8c8b4f4187e1b2ef72b7fd18de2b591a35aa78778500cf77d5edc292951deef867e1915d29d4daec968a898425c45eed522b9a7", 0xdd, 0x8}, {&(0x7f00000002c0)="ecfe72fdbc8c7ca86ba85a57b54cc9e12a63229444a8417041e5ee8e2a1503fdd2b8cbb28c7a769e349ad453ca5d9394052b874ac052ee39c7ff68d522bb5ee62bf53ca78f8b", 0x46, 0x80000000}], 0x1, &(0x7f00000003c0)={[{@nointegrity='nointegrity'}, {@nodiscard='nodiscard'}, {@noquota='noquota'}], [{@subj_role={'subj_role'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@smackfshat={'smackfshat', 0x3d, 'jfs\x00'}}]}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) shmget(0x2, 0x3000, 0x400, &(0x7f0000ffd000/0x3000)=nil) 03:35:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x40000000}) 03:35:01 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffa888}}}}}}}}}, 0x0) 03:35:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x70140000}) 03:35:02 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffca88}}}}}}}}}, 0x0) [ 973.401889][T15075] jfs: Unrecognized mount option "subj_role=" or missing value 03:35:02 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7ffb, 0x800) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f00000001c0)={0xffffffffffffffff, 0x3, 0x7ff}) sysinfo(&(0x7f0000000100)=""/152) 03:35:02 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffdd86}}}}}}}}}, 0x0) 03:35:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xa5ffffff}) [ 973.452005][T15084] EXT4-fs: 5 callbacks suppressed [ 973.452017][T15084] EXT4-fs (sda1): Unrecognized mount option "debug_want_ex%ra_isize=0x0000000000000000" or missing value 03:35:02 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = accept4$ax25(0xffffffffffffffff, &(0x7f00000000c0)={{}, [@bcast, @remote, @bcast, @null, @bcast, @rose, @rose]}, &(0x7f0000000000)=0x48, 0x800) getsockopt$bt_hci(r0, 0x0, 0x1, &(0x7f0000000240)=""/107, &(0x7f00000002c0)=0x6b) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20000, 0x0) socket$inet(0x2, 0x3, 0x6) r2 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r2, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x48, 0x14, 0x7, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@typed={0x34, 0x0, @binary="582f45cfac1414151b0965512fe4fa59a835ee66e0000002fd3953ffee03d79dc442c6bbe736863d55a7374efe"}]}, 0x48}}, 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000380)=0x100) r3 = dup2(r0, r0) ioctl$KDSKBMODE(r3, 0x4b45, &(0x7f0000000300)=0xc8b) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000140)=""/188, &(0x7f0000000200)=0xbc) 03:35:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_ex\x8era_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:02 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffff000}}}}}}}}}, 0x0) 03:35:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x7, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xb6000000}) 03:35:02 executing program 0: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x400, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x4, 0x7, 0x2, 0x9}]}, 0x10) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x42000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14, 0x80000) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000200)={r2, @empty, @dev={0xac, 0x14, 0x14, 0x1d}}, 0xc) 03:35:02 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff}}}}}}}}}, 0x0) 03:35:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xb8ffffff}) 03:35:02 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}}}}}}}}, 0x0) [ 973.858663][T15113] EXT4-fs (sda1): Unrecognized mount option "debug_want_exŽra_isize=0x0000000000000000" or missing value 03:35:02 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x4e21, @broadcast}}, 0x0, 0x0, 0x0, "bf6f566dc256dc5f142e2f71f305a772d195f3a3fc47ae44308f24d1ecfae7dd7dedc2fcac43c8ad5acf33c56f09846863e757064a4b810ef8d4112a107068717946f1d5d872c75b9ef9b520fe958ba6"}, 0xd8) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x8000000002, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40206417, &(0x7f00000000c0)={0x6, 0x3, 0x2, 0xfffffffffffffff7, 0xc, 0x81}) 03:35:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xc8000020}) 03:35:02 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}}}}}}}}}, 0x0) 03:35:02 executing program 0: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) utime(&(0x7f0000000040)='\x00', &(0x7f0000000080)={0x8, 0x9}) syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x6, 0x20000) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYBLOB="c3000000d1405a04a6b6391ae0f5fe1ca51c9ad90dd940a7ee15f16fc340627187441b950499253316e9647811457c584719857cf633bea0f79e77dce9441d64d0fa068e79d48ab215f38b20099046c467277adb0d20e6355459189ad0bc76f180c2d03d9bf76dfab0f648e05a8875fca82d08908271d778e1258bb76fbe6a4fe66390ce5d76e0049469ca09388ec1e24bb8f5381c784d58dd2b35fdeff30bdf6ec20c6ad4cdde25757c876315ce7d18822f1a5b9dcf433a7a08ba9f2f76d4269f716c68b6c509"], &(0x7f0000000240)=0xcb) [ 974.062111][T15137] EXT4-fs (sda1): Unrecognized mount option "debug_want_exŽra_isize=0x0000000000000000" or missing value [ 974.075775][T15146] Unknown ioctl 1075864599 03:35:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_ext\na_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:02 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}}}}}}}}}, 0x0) 03:35:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xfbffffff}) 03:35:02 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x806000000000000}}}}}}}}}, 0x0) [ 974.246487][T15154] Unknown ioctl 1075864599 03:35:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xfdfdffff}) 03:35:03 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f00000002c0)={0xa49f, 'syz1\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000000c0)={0x1, 0x1, 0x6, 'queue1\x00', 0x1}) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000300)=ANY=[@ANYBLOB="02000000000000001d840000000000000100000000000000b5426b355498eb91d69a1a4d5c5cbe9b771e061fdbf2ed71ff65b6db8911f381eb95b578f55528d06d6760435c4ec6f67c5c31d1964261e60dd92a79468a2dd82c1cca141a56e65ae52423f3e798d84c2cc10bd7c50f6e3557b66bdc6b2a52d4694436bb8be68f4982e0faebb1d9f3594a72216c217e7a5bffe058807d4e2458c8e3314a2d75da4cfb99d8", @ANYRES32=r0, @ANYBLOB="000000006b8200000000000000000000000000000000000000000000"]) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000001740)={@multicast1, @local, 0x0}, &(0x7f0000001780)=0xc) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f00000017c0)={@empty, @multicast2, r1}, 0xc) syz_mount_image$minix(&(0x7f0000000180)='minix\x00', &(0x7f0000000440)='./file0\x00', 0x6, 0x1, &(0x7f0000000280)=[{&(0x7f0000000240)="819c24394186981227bdcc96add0ba588f7422cb2e9b", 0xfe3c, 0x3}], 0x41ffd, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x0, 0x0, 0x0, 0x0) 03:35:03 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000}}}}}}}}}, 0x0) 03:35:03 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x400) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000480)={'filter\x00'}, &(0x7f0000000500)=0x54) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f0000000140)={0x14, r1, 0x20, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20040800}, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='.\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:35:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xfffffdfd}) [ 974.423910][T15163] EXT4-fs (sda1): Unrecognized mount option "debug_want_ext [ 974.423910][T15163] a_isize=0x0000000000000000" or missing value 03:35:03 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}}}}}}}}}, 0x0) 03:35:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xffffffa5}) 03:35:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_ext%a_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:03 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2800000000000000}}}}}}}}}, 0x0) 03:35:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x10, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xffffffb8}) 03:35:03 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3000000000000000}}}}}}}}}, 0x0) 03:35:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xfffffffb}) 03:35:03 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x48300, 0x0) write$P9_RCLUNK(r0, &(0x7f00000000c0)={0x7, 0x79, 0x1}, 0x7) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:35:03 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}}}}}}}}}, 0x0) [ 974.902803][T15197] EXT4-fs (sda1): Unrecognized mount option "debug_want_ext%a_isize=0x0000000000000000" or missing value 03:35:03 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, 0x0, 0x2, 0x0) 03:35:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x10000000000}) 03:35:03 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4305000000000000}}}}}}}}}, 0x0) 03:35:03 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x101000, 0x0) r1 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$CAPI_SET_FLAGS(r0, 0x80044324, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x40000000}) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0xb) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:35:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_ext\x8ea_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x1000000000000}) 03:35:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2b, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:03 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000}}}}}}}}}, 0x0) 03:35:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xd000000000000}) 03:35:03 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10, 0x0) 03:35:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x10000000000000}) 03:35:03 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000}}}}}}}}}, 0x0) 03:35:04 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0) [ 975.307425][T15233] EXT4-fs (sda1): Unrecognized mount option "debug_want_extŽa_isize=0x0000000000000000" or missing value 03:35:04 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x800e000000000000}}}}}}}}}, 0x0) 03:35:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x20000000000000}) 03:35:04 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8035000000000000}}}}}}}}}, 0x0) [ 975.601870][T15260] EXT4-fs (sda1): Unrecognized mount option "debug_want_extŽa_isize=0x0000000000000000" or missing value 03:35:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extr\n_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x100000000000000}) 03:35:04 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v3={0x3000000, [{0x7, 0x9}, {0x0, 0xb54}], r0}, 0x18, 0x2) 03:35:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2d, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:04 executing program 0: socket$vsock_dgram(0x28, 0x2, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x248900, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x804000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x900, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x5d38f8c174fbc18}, 0x4) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000180)=0x8000000) syz_mount_image$jfs(&(0x7f0000000200)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x80000100000, 0x2bc, 0x0, 0xd, 0x0) 03:35:04 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000}}}}}}}}}, 0x0) 03:35:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x200000000000000}) 03:35:04 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x200, 0x400) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000001540)={0x20, 0x0, 0x101, 0x43, &(0x7f00000003c0)=""/67, 0x1000, &(0x7f0000000440)=""/4096, 0xdf, &(0x7f0000001440)=""/223}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180)={0xffffffffffffffff}, 0x117, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r1, 0x9, "428f8b", "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"}}, 0x110) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x20043fe, 0x0) accept$unix(r2, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x3, 0x2) 03:35:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x400000000000000}) 03:35:04 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000}}}}}}}}}, 0x0) 03:35:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x900000000000000}) 03:35:04 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8847000000000000}}}}}}}}}, 0x0) [ 975.986991][T15283] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr [ 975.986991][T15283] _isize=0x0000000000000000" or missing value 03:35:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extr%_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:04 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000080)={0x1, 0x40, 0x3, 0x401}, 0x6) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x124, 0x0, 0xfffffffffffffffc, 0x0) 03:35:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xd00000000000000}) 03:35:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x48, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:04 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8848000000000000}}}}}}}}}, 0x0) 03:35:04 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2604c1, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f00000000c0)={0x8, 0x4, 0x5, 0x2, 0x401, 0x92b}) 03:35:04 executing program 0: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x440, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x3, 0x800) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f00000002c0)={0x3, 0x6}) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000040)="28173ba8a2c67159afff3fb567bd6dea7f2aaad3ad5fefbaf871867bc3220dd86f80e68ff7e558a703c5db19867b68efe66dfcc9a53c4666a136e8", 0x3b, 0xfffffffffffffff8) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000200), &(0x7f0000000240)=0x0, &(0x7f0000000280)) keyctl$chown(0x4, r1, r2, r3) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fallocate(r4, 0x40, 0x0, 0x2) readahead(r4, 0x1000, 0x4) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x28) syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0xc00000000, 0x2000) setsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, &(0x7f0000000080)=0x1, 0x4) 03:35:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x1b00000000000000}) 03:35:04 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8864000000000000}}}}}}}}}, 0x0) [ 976.315721][T15314] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr%_isize=0x0000000000000000" or missing value 03:35:05 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x9, 0x4, &(0x7f0000000340)=[{&(0x7f0000000100)="bee0357897ca06b0e02502bf7a1677a2824f8bfc26fb9d79e09ed4d4535e04d75797029b11817db75eaf78c39ad259a97d5cd375f6e5b3869be938a26010d1fa5aba383e50d815279002136cf28c941a2f18e841560f3a56b2", 0x59, 0x9}, {&(0x7f0000000180)="b126ed4821a81a003f92ced6a8d5f03ccf2945b1b43f2209a4e43f47cce187bf876bdfd0b0da4eed078a9e0e02dbadc99ae960a7bce8b9c4959c3d686bc020944314d2c1a6e10d12b8ce1d86a5c00661dd3da534ae6323ee7a88b5a33df08cf45b597b2e624c897768fbac00264dc98432fbae1ed5f9cdd7f273d21a3e62f0add555be6f8b2578a8e95ca686e509d82f2df2", 0x92, 0xc000}, {&(0x7f0000000240)="a7644034b34dffd5a07f1579f60e6e", 0xf, 0x2}, {&(0x7f0000000280)="4608614fb492ca5e01240574770802c537af3638b1af919a440f84c1cd321b620427a3f39f395abb636cd4e2cd71783b18fee0db6021638c9870703a76de1ffdc09cc01934123e28e1140f01925ba666885e9ea071e6762aca8192711dc98adf4a6f476dd9a4f4a8d452dd61ccd4110c2c0a0c2fc0739c3a601318f846eaaa8dd6f1fd5527a7f4c742b2b54aab7e733bf49960e6714f77317f1b67133e6d8084fe0d434721a52f20913e9e6c35b7ebba", 0xb0, 0x400000000000}], 0x20, &(0x7f00000003c0)={[{@integrity='integrity'}, {@nointegrity='nointegrity'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@hash='hash'}]}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x0, 0x0, 0x4, 0x0) 03:35:05 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000}}}}}}}}}, 0x0) 03:35:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x1d00000000000000}) [ 976.448271][T15334] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr%_isize=0x0000000000000000" or missing value 03:35:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extr\x8e_isize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x3700000000000000}) 03:35:05 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x88caffff00000000}}}}}}}}}, 0x0) 03:35:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x4c, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:05 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x20000, 0x100) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f00000000c0)={{0x5e, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x0, 'lc\x00', 0x8, 0xfffffffffffff9cb, 0x34}, {@local, 0x4e20, 0x7, 0x3f, 0xa719, 0x5}}, 0x44) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x0, 0x0, 0x1000, 0x0) 03:35:05 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8906000000000000}}}}}}}}}, 0x0) 03:35:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x3f00000000000000}) 03:35:05 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3f, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x5, 0x4) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x81, 0x0) sendfile(r0, r1, 0x0, 0x13) 03:35:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x4000000000000000}) 03:35:05 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000}}}}}}}}}, 0x0) 03:35:05 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f00000000c0)) 03:35:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x7014000000000000}) 03:35:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra\nisize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:05 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}}}}}}}}, 0x0) 03:35:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xa5ffffff00000000}) 03:35:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x68, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:05 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}}}}}}}}, 0x0) 03:35:05 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2802, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r1}}, 0xc) 03:35:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xb600000000000000}) 03:35:05 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2}}}}}}}}}, 0x0) 03:35:05 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getrandom(&(0x7f00000000c0)=""/4096, 0x1000, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000001140)='/dev/vcs#\x00', 0x1454, 0x80100) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000001240)='/dev/audio\x00', 0x40000, 0x0) r2 = accept4$unix(r1, 0x0, &(0x7f0000001200)=0xffffffffffffff87, 0x80800) connect$unix(r2, &(0x7f00000010c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001280)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000000)=0xe8) preadv(r1, &(0x7f0000001e40)=[{&(0x7f0000001b80)=""/59, 0x3b}, {&(0x7f0000001bc0)=""/138, 0x8a}, {&(0x7f0000001c80)=""/138, 0x8a}, {&(0x7f0000001d40)=""/79, 0x4f}, {&(0x7f0000001dc0)=""/48, 0x30}, {&(0x7f0000001e00)=""/8, 0x8}], 0x6, 0x0) msgget(0x2, 0x83) stat(&(0x7f0000001180)='./file0\x00', &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001400)={{{@in=@initdev, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) fstat(r2, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000001580), &(0x7f00000015c0)=0x0, &(0x7f0000001600)) stat(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001700)={0x0, 0x0}, &(0x7f0000001740)=0xc) stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000001b40)={0x6, &(0x7f0000001b00)=[{0x4, 0xfffffffffffffffa, 0x7b, 0x3}, {0x100, 0xb9d5, 0x9, 0x1}, {0x7fffffff, 0x0, 0x5, 0x3}, {0x39, 0x3, 0x5, 0x6}, {0x1, 0x6, 0x3, 0xed3a}, {0x377, 0x800, 0x10000}]}, 0x10) write$FUSE_DIRENTPLUS(r1, &(0x7f0000001840)={0x288, 0x0, 0x5, [{{0x6, 0x0, 0x0, 0x100000001, 0x9, 0xd75, {0x3, 0x5, 0x8, 0x6ed7730f, 0x2, 0x9, 0x9, 0xd4, 0x7, 0x9, 0x0, r3, r4, 0x1, 0xfffffffffffffff7}}, {0x5, 0xff, 0x0, 0xfffffffffffffff7}}, {{0x6, 0x0, 0x2de, 0x7fffffff, 0x3, 0x70469038, {0x3, 0x8000000000000, 0x4, 0x3, 0xac9b, 0x7, 0x8, 0x0, 0x80000000, 0x8a, 0x65, r5, r6, 0x8, 0x6}}, {0x4, 0x80, 0xa, 0x2, '/dev/vcs#\x00'}}, {{0x0, 0x1, 0x7, 0x6, 0x1, 0x9, {0x0, 0x81, 0x0, 0x2, 0x7, 0x0, 0x0, 0x4, 0x2, 0x4eb, 0x1, r7, r8, 0x6346, 0x1}}, {0x6, 0x8, 0x4, 0x70b, 'jfs\x00'}}, {{0x2, 0x3, 0xffffffffffff8000, 0x4, 0x3ff, 0x0, {0x2, 0x1, 0xffffffffffffffff, 0x7fffffff, 0x1f83243e, 0x8, 0x100, 0x2af, 0xe8, 0x8001, 0x8, r9, r10, 0x2, 0x7}}, {0x0, 0x80, 0x0, 0xe0e0}}]}, 0x288) 03:35:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xb8ffffff00000000}) 03:35:06 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8}}}}}}}}}, 0x0) 03:35:06 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xd}}}}}}}}}, 0x0) 03:35:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra\x8eisize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xc800002000000000}) 03:35:06 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x20, 0x80000) getsockname(r0, &(0x7f00000000c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, &(0x7f0000000140)=0x80) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x17d, 0x0, 0x0, 0x0) 03:35:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6c, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:06 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x28}}}}}}}}}, 0x0) 03:35:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xfbffffff00000000}) 03:35:06 executing program 2 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:35:06 executing program 0: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80340000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, r1, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x25}}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20004011}, 0x20000000) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:35:06 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x30}}}}}}}}}, 0x0) 03:35:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xfdfdffff00000000}) [ 977.809801][T15444] FAULT_INJECTION: forcing a failure. [ 977.809801][T15444] name failslab, interval 1, probability 0, space 0, times 0 [ 977.845393][T15444] CPU: 1 PID: 15444 Comm: syz-executor.2 Not tainted 5.0.0-rc8-next-20190301 #1 [ 977.854535][T15444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 977.865519][T15444] Call Trace: [ 977.865543][T15444] dump_stack+0x172/0x1f0 [ 977.865563][T15444] should_fail.cold+0xa/0x15 [ 977.865583][T15444] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 977.877826][T15444] ? ___might_sleep+0x163/0x280 [ 977.877847][T15444] __should_failslab+0x121/0x190 [ 977.877864][T15444] should_failslab+0x9/0x14 [ 977.877876][T15444] __kmalloc+0x2dc/0x740 [ 977.877902][T15444] ? sg_scsi_ioctl+0x409/0x7f0 03:35:06 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x48}}}}}}}}}, 0x0) [ 977.898024][T15444] sg_scsi_ioctl+0x409/0x7f0 [ 977.898048][T15444] sg_ioctl+0x219f/0x2a10 [ 977.898069][T15444] ? sg_new_write.isra.0+0xa70/0xa70 [ 977.911631][T15444] ? __fget+0x35a/0x550 [ 977.911654][T15444] ? sg_new_write.isra.0+0xa70/0xa70 [ 977.911671][T15444] do_vfs_ioctl+0xd6e/0x1390 [ 977.911689][T15444] ? ioctl_preallocate+0x210/0x210 [ 977.911701][T15444] ? __fget+0x381/0x550 [ 977.911717][T15444] ? ksys_dup3+0x3e0/0x3e0 [ 977.911734][T15444] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 977.921310][T15444] ? fput_many+0x12c/0x1a0 [ 977.921331][T15444] ? tomoyo_file_ioctl+0x23/0x30 [ 977.921347][T15444] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 977.921361][T15444] ? security_file_ioctl+0x93/0xc0 [ 977.921377][T15444] ksys_ioctl+0xab/0xd0 [ 977.930767][T15444] __x64_sys_ioctl+0x73/0xb0 [ 977.930786][T15444] do_syscall_64+0x103/0x610 [ 977.940449][T15444] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 977.940474][T15444] RIP: 0033:0x457e29 03:35:06 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x60}}}}}}}}}, 0x0) [ 977.940487][T15444] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 977.940494][T15444] RSP: 002b:00007f0d55fe5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 977.940507][T15444] RAX: ffffffffffffffda RBX: 00007f0d55fe5c90 RCX: 0000000000457e29 [ 977.940513][T15444] RDX: 00000000200000c0 RSI: 0000000000000001 RDI: 0000000000000004 [ 977.940524][T15444] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 977.955403][T15444] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0d55fe66d4 [ 977.955412][T15444] R13: 00000000004c1875 R14: 00000000004d3980 R15: 0000000000000005 03:35:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_\nsize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:06 executing program 2 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:35:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x4000, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) recvmmsg(0xffffffffffffff9c, &(0x7f0000000380)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000100)=""/35, 0x23}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000180)=""/246, 0xf6}], 0x3, &(0x7f00000002c0)=""/134, 0x86}, 0x40}], 0x1, 0x0, &(0x7f00000003c0)) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e21, 0x1, @remote, 0xf977}}, 0x3f, 0x147, 0x1, 0x2, 0x9c}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000540)=@assoc_value={r2, 0x3}, &(0x7f0000000580)=0x8) [ 978.270995][T15472] FAULT_INJECTION: forcing a failure. [ 978.270995][T15472] name failslab, interval 1, probability 0, space 0, times 0 [ 978.291840][T15472] CPU: 0 PID: 15472 Comm: syz-executor.2 Not tainted 5.0.0-rc8-next-20190301 #1 [ 978.300972][T15472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 978.311102][T15472] Call Trace: [ 978.314388][T15472] dump_stack+0x172/0x1f0 [ 978.318717][T15472] should_fail.cold+0xa/0x15 [ 978.323322][T15472] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 978.329272][T15472] ? ___might_sleep+0x163/0x280 [ 978.334135][T15472] __should_failslab+0x121/0x190 [ 978.339064][T15472] should_failslab+0x9/0x14 [ 978.343594][T15472] __kmalloc+0x2dc/0x740 [ 978.347831][T15472] ? __lock_acquire+0x548/0x3fb0 [ 978.352776][T15472] ? kasan_check_write+0x14/0x20 [ 978.357699][T15472] ? bio_alloc_bioset+0x418/0x680 [ 978.362715][T15472] bio_alloc_bioset+0x418/0x680 [ 978.367558][T15472] ? refcount_sub_and_test_checked+0x154/0x200 [ 978.373700][T15472] ? bvec_alloc+0x2f0/0x2f0 [ 978.378192][T15472] ? find_held_lock+0x35/0x130 [ 978.382949][T15472] bio_map_kern+0x49/0x1c0 [ 978.387365][T15472] blk_rq_map_kern+0x236/0x4d0 [ 978.392118][T15472] ? blk_rq_map_user+0x190/0x190 [ 978.397049][T15472] ? ns_capable_common+0x93/0x100 [ 978.402067][T15472] ? capable+0x1f/0x30 [ 978.406130][T15472] sg_scsi_ioctl+0x515/0x7f0 [ 978.410716][T15472] sg_ioctl+0x219f/0x2a10 [ 978.415042][T15472] ? sg_new_write.isra.0+0xa70/0xa70 [ 978.420342][T15472] ? __fget+0x35a/0x550 [ 978.424497][T15472] ? sg_new_write.isra.0+0xa70/0xa70 [ 978.429799][T15472] do_vfs_ioctl+0xd6e/0x1390 [ 978.434381][T15472] ? ioctl_preallocate+0x210/0x210 [ 978.439568][T15472] ? __fget+0x381/0x550 [ 978.443817][T15472] ? ksys_dup3+0x3e0/0x3e0 [ 978.448227][T15472] ? tomoyo_file_ioctl+0x23/0x30 [ 978.453152][T15472] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 978.459377][T15472] ? security_file_ioctl+0x93/0xc0 [ 978.464582][T15472] ksys_ioctl+0xab/0xd0 [ 978.468728][T15472] __x64_sys_ioctl+0x73/0xb0 [ 978.473306][T15472] ? do_syscall_64+0x5b/0x610 [ 978.477985][T15472] do_syscall_64+0x103/0x610 [ 978.482567][T15472] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 978.488449][T15472] RIP: 0033:0x457e29 [ 978.492334][T15472] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 978.512026][T15472] RSP: 002b:00007f0d55fe5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 978.520439][T15472] RAX: ffffffffffffffda RBX: 00007f0d55fe5c90 RCX: 0000000000457e29 [ 978.528411][T15472] RDX: 00000000200000c0 RSI: 0000000000000001 RDI: 0000000000000004 [ 978.536371][T15472] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 978.544414][T15472] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0d55fe66d4 [ 978.552405][T15472] R13: 00000000004c1875 R14: 00000000004d3980 R15: 0000000000000005 03:35:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x74, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:07 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xf0}}}}}}}}}, 0x0) 03:35:07 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x40, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x1, @bcast, @bpq0='bpq0\x00', 0x3, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x10001, 0x8, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x0, 0x0, 0x3, 0x0) 03:35:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000002980)) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x6b5, 0x9, &(0x7f0000002640)=[{&(0x7f0000000100)="502ef1a88e2f1344e70f3e6297c8bc61c38a71f04ef9c181742a57947230d15b6f6d27d72bd97505314a03da55aeb0983ef68d005071de7215c79b913c96e47b7408c64ef98076268e9ede69cc8c270e2218f8354fd5964fa6a5e98c86d72d98b6afaa59d7d35ffb14a17279460287adee94cc915bb9af80f62c0f64795a974acbc79f6ad251113c5178433f2ade00c7c39945b84c0094f817bf3e9eaf314e26f427e34e426cd5f54270b6de819456eea65ad7b5117ac1fe04e315459ecd4ba0eb182ff4339b62f5b0f8cf9f0043515fc4365436d48ab1131e19", 0xda, 0x1}, {&(0x7f0000000200)="8e57c8b5f2966ee20b13042dd0c76b59cdd553f09474f0294ebedf0a104b2c2d77fbd3a8fd7e746b7365d53b47be22b519eb7f6d6c8e11fff8e47882d7e9e611e5b97ac46b2fdb9f64219031c947a9fa3a031fb980fd5a895541f91ef1656522e9acf71a3474fe4f65edf3d104db7864aca902e544fbc39a8a865c8a4536e3da8ffb4a42565bc791b1a0b3c9d28fd8fd49e4bc775c8cc54b3ffacc30f20db9426ddd17dc548692638d176862f3cbdb5bfce5ea1fb2ea095477b08698db5820a54d0763377751a11abc7064c09815229c04992cdfb01447feb388457aebe6074b642048d61534ec51b89bf93efa31011df27d9ff714438531b5078cc2f6", 0xfd, 0x2}, {&(0x7f0000000300)="7dd4f100fbc6f85fd94210db37641d7f3ad3a85bbce44f15b71c5837f01ef9ffc3d02ac12fd2bdef65df86eefd092966b22db9325e508cc11899c9225cac2dae64a3aaeb0c730048823676d869fe344c49bff94ed28f11135c865893049639174563b98306d3f0e93ca5ef74962ed9e510570ab0fbbfd4e834df2ba756543731f988e2d3d8ed1e2547a7fa6d4b7f494404d7d0f1e94512e49b2dff4525211096ec61be104f1a4f7be18b4cb0d06d2d88bac79c59fe1e54fe476e3fe4224bde6b96d978a732e07d13c0e97a389e8256", 0xcf, 0x100}, {&(0x7f0000000400)="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", 0x1000, 0x54a}, {&(0x7f0000001400)="902235f85c9563997faa69c7c103221f4f5295c6b7528ab6441dbc504c939cefc35526296bd0f97be19016f97f3abde467a00d8eb279f447c073e967be1495c3bf7ded1d0695ff663fc0120fe0a901d621d70a4d8fde4c68215d84481fc1962ea4c6f7825fce850c74ed9a427630a80f72e6ee5a2134212e4317b0decb4a3cff4b693e79143bcaa74e1598c15b3d66ca2c31d03bda86706ad3963d53923afe52043ec428dbf5ac", 0xa7, 0x80000001}, {&(0x7f00000014c0)="e4ad487c703fdce2a705a7b88b255725d000dc857537e6d4377b71cb5894d0f5f74fbe4ec4d906ceb2", 0x29, 0x9}, {&(0x7f0000001500)="6609e0569ed97057a78a5ee4796c84b6064c72554579651b44d674d872252dcbb02ab9d4dfcbe54e0bfff1dba754607c6cab084d8c1c29f724ef2a3d6a3612a380c237cfeb8341c21776b76e7174a2708df6923ad893770f853050543c7d3c5002c5417d242a3612ca79bf86e60dc4e24a892a1c4428107c3e587838f2207d0e550031d0502cc2f71c0a6ec089a1f319452dca8ab6daec2d2588fdad63b65932330c1112b67cf8bf5387a19f94f007d22b3703aa10397b9f7e73255fc2fb7e8b62ae42f0de0d3089499f4ae350ad1859c8bd7daa05d42414e322f306200364297488db588032e4a665fb7236945661e9323012a1848f505e71ac1afa9c16", 0xfe, 0x80}, {&(0x7f0000001600)="664468e0beeece3eb352fc4cc48dfeb974", 0x11, 0x1}, {&(0x7f0000001640)="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", 0x1000, 0xc682}], 0x10000, &(0x7f0000002740)=ANY=[@ANYBLOB="6eef636f6d70726573732c6e6f726f636b2c756e6f6c6965742c6e6f636f6d70726573732c7375626a1f726f6c653d2f6465762f736723002c7375626a5f726f6c653d766d6e657431242c736d61636b6673726f6f743d2c00b5ec8016"]) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000029c0)={0x6d, 0x8e6c, 0x0, "2047282a3f7d4b5bf880f17883126d58de7b6f3d3a908c223e730a00c437ae348576583bc18f5c0eaa6393a733aa377ee55936c5c802a7c868d20182232e248b2b71835fa766f9341dcee1fb9ba12a71864796edf3bef022c9f4f8924a429913bb8e606dfafc5af24b8279d686"}) r1 = syz_open_dev$dspn(&(0x7f0000002800)='/dev/dsp#\x00', 0x6, 0x40000) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008ae05, &(0x7f0000002840)=""/217) 03:35:07 executing program 2 (fault-call:2 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) [ 978.619552][T15474] EXT4-fs: 5 callbacks suppressed [ 978.619561][T15474] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ [ 978.619561][T15474] size=0x0000000000000000" or missing value 03:35:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:35:07 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x543}}}}}}}}}, 0x0) 03:35:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2, &(0x7f00000000c0)={0xd00}) 03:35:07 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x608}}}}}}}}}, 0x0) 03:35:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_\x8esize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ffe8ffffffffffe00000"]) fchdir(r0) 03:35:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x3, &(0x7f00000000c0)={0xd00}) [ 978.982206][T15505] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_Žsize=0x0000000000000000" or missing value 03:35:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x7a, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:07 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x689}}}}}}}}}, 0x0) 03:35:07 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x144, 0x0, 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xaeef, 0x101000) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) 03:35:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1267, &(0x7f00000000c0)={0xd00}) 03:35:07 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f0000000040)={0xb13, 0xe5, 0x380000000000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x800000000000000, 0xc0001) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000000c0)={0xd00}) 03:35:07 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0) 03:35:07 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x806}}}}}}}}}, 0x0) [ 979.162483][T15521] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_Žsize=0x0000000000000000" or missing value 03:35:07 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xd00}}}}}}}}}, 0x0) 03:35:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x441, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000180)=0x5, 0x4) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40120}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x24, r2, 0x2, 0x70bd25, 0x25dfdbfd, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x8000}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x8010}, 0x40000) 03:35:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_i\nize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1274, &(0x7f00000000c0)={0xd00}) 03:35:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1275, &(0x7f00000000c0)={0xd00}) 03:35:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x300, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:08 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xe80}}}}}}}}}, 0x0) 03:35:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x2000000000, 0x8000080fc) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:35:08 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) readlink(&(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)=""/119, 0x77) 03:35:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1276, &(0x7f00000000c0)={0xd00}) [ 979.437499][T15547] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i [ 979.437499][T15547] ize=0x0000000000000000" or missing value 03:35:08 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000}}}}}}}}}, 0x0) 03:35:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x1a3001, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x3, 0x4) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000e608090d537f7e04ac17d0843b11a697"]) 03:35:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2201, &(0x7f00000000c0)={0xd00}) [ 979.585717][T15561] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i [ 979.585717][T15561] ize=0x0000000000000000" or missing value 03:35:08 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200200, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000100)=""/176) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="e72f95acb4387c"]) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) 03:35:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_i#ize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2202, &(0x7f00000000c0)={0xd00}) 03:35:08 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2800}}}}}}}}}, 0x0) 03:35:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x500, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x20400) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="000d000000000004000000000db1506299305186341e1f1d24031878e3ea8034e75de4de88102ca2b11f75120eba2c71455a4df617160da86f3c1f24f6f9b7b6f2e875077b46ec845d6827000327281ef7ea2d9975cfa900f610008c000055"]) 03:35:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2203, &(0x7f00000000c0)={0xd00}) 03:35:08 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3000}}}}}}}}}, 0x0) 03:35:08 executing program 0: r0 = socket$nl_crypto(0x10, 0x3, 0x15) recvmsg(r0, &(0x7f0000000840)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000740)=[{&(0x7f00000001c0)=""/222, 0xde}, {&(0x7f00000002c0)=""/219, 0xdb}, {&(0x7f00000003c0)}, {&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/227, 0xe3}, {&(0x7f00000005c0)=""/4, 0x4}, {&(0x7f0000000600)=""/228, 0xe4}, {&(0x7f0000000700)=""/35, 0x23}], 0x8, &(0x7f00000007c0)=""/80, 0x50}, 0x20) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) mount(&(0x7f00000003c0)=ANY=[@ANYBLOB="2f4185716e0e3b2265762f6c6f6f703000"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='gfs2\x00', 0x1000000, 0x0) [ 979.912188][T15588] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i#ize=0x0000000000000000" or missing value 03:35:08 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3580}}}}}}}}}, 0x0) 03:35:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0xd, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:35:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2205, &(0x7f00000000c0)={0xd00}) [ 980.085239][T15600] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i#ize=0x0000000000000000" or missing value 03:35:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2270, &(0x7f00000000c0)={0xd00}) 03:35:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_i%ize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:08 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3f00}}}}}}}}}, 0x0) 03:35:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0x9c, 0xfffffffffffffffc, 0x0, "7a96c8837ea2e554005853cdcb8dc9cd52064981602ea4edc06498ae73efab66c6d1c0660c0c71d965ba3d4b1999426ef7d76215e048bcf4532919f5cf8ff3e1edab5a8380a270dd45f63e05a9604ac46dc6e835be776a9b68353715d342183b3eb6ad31e9c9ae55acea981f3e71d3a95082dbb4d434f811348f79088295418bc6dc5699f700fdea53d27890456a3253deec519c77a34a66cd061af2"}) 03:35:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x600, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2271, &(0x7f00000000c0)={0xd00}) 03:35:09 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4305}}}}}}}}}, 0x0) 03:35:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x10000, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000140)=0x1) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40400, 0x0) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f0000000040)={0x7, 0x7ff}) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0x0, 0x0, 0x80}) [ 980.386529][T15627] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i%ize=0x0000000000000000" or missing value 03:35:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2201, &(0x7f00000000c0)={0xd00}) 03:35:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2272, &(0x7f00000000c0)={0xd00}) 03:35:09 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4788}}}}}}}}}, 0x0) 03:35:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0xd5c, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:35:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_i*ize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x700, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:09 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4800}}}}}}}}}, 0x0) 03:35:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x480000, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) 03:35:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2275, &(0x7f00000000c0)={0xd00}) [ 980.925000][T15651] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i*ize=0x0000000000000000" or missing value 03:35:09 executing program 0 (fault-call:3 fault-nth:0): socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:35:09 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4888}}}}}}}}}, 0x0) 03:35:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) r1 = getpgid(0x0) r2 = getpgrp(0xffffffffffffffff) tgkill(r1, r2, 0x17) 03:35:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2276, &(0x7f00000000c0)={0xd00}) 03:35:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_i+ize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="000d0000000000000000000016ce31e0e83173f30b6ffe94095bee0bd0cf4ecdc49d53a7ebe82c4a28ca738c1905da31b9228a550d853678fa75efb8d32d2a49c9cf7e10a30eb916662887fe578fabe503b8e17f7a8f7458181e69b322c7d0369cf7b47c0e06765116476bf65102b3ee7947cc167281fbc4a6b9891fe8bb755343b2172fddee819f0c62"]) 03:35:09 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6000}}}}}}}}}, 0x0) 03:35:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2279, &(0x7f00000000c0)={0xd00}) 03:35:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x900, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:09 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6488}}}}}}}}}, 0x0) 03:35:09 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x4, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000000c0)={0xd00}) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x12, 0x64000) ioctl$VIDIOC_G_ENC_INDEX(r2, 0x8818564c, &(0x7f0000000100)) ioctl$RNDGETENTCNT(r2, 0x80045200, &(0x7f0000000940)) r3 = fcntl$getown(r0, 0x9) write$cgroup_pid(r2, &(0x7f0000000040)=r3, 0x12) [ 981.284340][T15685] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i+ize=0x0000000000000000" or missing value 03:35:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227a, &(0x7f00000000c0)={0xd00}) [ 981.905522][T15671] FAULT_INJECTION: forcing a failure. [ 981.905522][T15671] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 981.919558][T15671] CPU: 1 PID: 15671 Comm: syz-executor.0 Not tainted 5.0.0-rc8-next-20190301 #1 [ 981.928569][T15671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 981.938613][T15671] Call Trace: [ 981.941897][T15671] dump_stack+0x172/0x1f0 [ 981.946257][T15671] should_fail.cold+0xa/0x15 [ 981.950854][T15671] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 981.956655][T15671] should_fail_alloc_page+0x50/0x60 [ 981.961840][T15671] __alloc_pages_nodemask+0x1a1/0x7e0 [ 981.967213][T15671] ? find_held_lock+0x35/0x130 [ 981.971971][T15671] ? __alloc_pages_slowpath+0x2900/0x2900 [ 981.977686][T15671] ? lock_downgrade+0x880/0x880 [ 981.982527][T15671] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 981.988762][T15671] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 981.995003][T15671] alloc_pages_current+0x107/0x210 [ 982.000118][T15671] __get_free_pages+0xc/0x40 [ 982.004704][T15671] __tlb_remove_page_size+0x2ee/0x510 [ 982.010098][T15671] unmap_page_range+0xedf/0x2330 [ 982.015039][T15671] ? vm_normal_page_pmd+0x400/0x400 [ 982.020226][T15671] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 982.026452][T15671] ? uprobe_munmap+0xad/0x2b0 [ 982.031119][T15671] unmap_single_vma+0x19d/0x300 [ 982.035967][T15671] unmap_vmas+0x115/0x250 [ 982.040289][T15671] ? zap_vma_ptes+0x110/0x110 [ 982.044950][T15671] ? get_kernel_page+0xb0/0xb0 [ 982.049710][T15671] ? kasan_check_write+0x14/0x20 [ 982.054665][T15671] exit_mmap+0x2c2/0x530 [ 982.058904][T15671] ? __ia32_sys_munmap+0x80/0x80 [ 982.063832][T15671] ? __sanitizer_cov_trace_const_cmp4+0x9/0x20 [ 982.069977][T15671] ? rcu_read_lock_sched_held+0x110/0x130 [ 982.075706][T15671] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 982.081936][T15671] ? __khugepaged_exit+0xcf/0x400 [ 982.087040][T15671] mmput+0x15f/0x4c0 [ 982.090924][T15671] do_exit+0x816/0x2fa0 [ 982.095169][T15671] ? get_signal+0x331/0x1d50 [ 982.099751][T15671] ? mm_update_next_owner+0x640/0x640 [ 982.105115][T15671] ? kasan_check_write+0x14/0x20 [ 982.110043][T15671] ? _raw_spin_unlock_irq+0x28/0x90 [ 982.115222][T15671] ? get_signal+0x331/0x1d50 [ 982.119880][T15671] ? _raw_spin_unlock_irq+0x28/0x90 [ 982.125065][T15671] do_group_exit+0x135/0x370 [ 982.129640][T15671] get_signal+0x399/0x1d50 [ 982.134043][T15671] ? lock_downgrade+0x880/0x880 [ 982.138895][T15671] do_signal+0x87/0x1940 [ 982.143126][T15671] ? wait_for_completion+0x440/0x440 [ 982.148409][T15671] ? setup_sigcontext+0x7d0/0x7d0 [ 982.153430][T15671] ? __x64_sys_ppoll+0x21c/0x380 [ 982.158350][T15671] ? __ia32_sys_poll+0x460/0x460 [ 982.163278][T15671] ? ksys_write+0x166/0x1f0 [ 982.167771][T15671] ? exit_to_usermode_loop+0x43/0x2c0 [ 982.173218][T15671] ? do_syscall_64+0x52d/0x610 [ 982.177966][T15671] ? exit_to_usermode_loop+0x43/0x2c0 [ 982.183411][T15671] ? lockdep_hardirqs_on+0x418/0x5d0 [ 982.188680][T15671] ? trace_hardirqs_on+0x67/0x230 [ 982.193692][T15671] exit_to_usermode_loop+0x244/0x2c0 [ 982.199068][T15671] do_syscall_64+0x52d/0x610 [ 982.203648][T15671] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 982.209543][T15671] RIP: 0033:0x457e29 [ 982.213438][T15671] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 982.233026][T15671] RSP: 002b:00007fa9c8908c78 EFLAGS: 00000246 ORIG_RAX: 000000000000010f [ 982.241426][T15671] RAX: 0000000000000002 RBX: 00007fa9c8908c90 RCX: 0000000000457e29 [ 982.249400][T15671] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000020000100 03:35:10 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:35:10 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x800e}}}}}}}}}, 0x0) 03:35:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x401, 0x80) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x16e) setsockopt$llc_int(r0, 0x10c, 0xd, &(0x7f0000000040)=0x2, 0x4) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000100)={0x4, 0x34, 0x101, 0x0, 0xe}) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000000c0)={0xd00}) 03:35:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227b, &(0x7f00000000c0)={0xd00}) 03:35:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_i-ize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf23, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) [ 982.257373][T15671] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 982.265420][T15671] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa9c89096d4 [ 982.273379][T15671] R13: 00000000004c4501 R14: 00000000004d7d00 R15: 0000000000000005 03:35:11 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8035}}}}}}}}}, 0x0) 03:35:11 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x5, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000140)={0x19a, 0x0, 0x8, "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"}) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x3000) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000000)=0x1, &(0x7f0000000040)=0x4) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x80000, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) 03:35:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227c, &(0x7f00000000c0)={0xd00}) 03:35:11 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8100}}}}}}}}}, 0x0) 03:35:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227d, &(0x7f00000000c0)={0xd00}) 03:35:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x400, 0x480003) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x200, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f00000009c0)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000a00)={@mcast1, 0x48, r2}) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) r3 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$KVM_SET_XSAVE(r3, 0x5000aea5, &(0x7f0000000500)={"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"}) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000040)) 03:35:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x1f00, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_i.ize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:11 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8847}}}}}}}}}, 0x0) 03:35:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x141000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x80, @local, 0x2b8}, @in6={0xa, 0x4e22, 0xd5, @ipv4={[], [], @local}, 0x10001}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0xfffffffffffffff9, @remote, 0x3}, @in={0x2, 0x4e23, @multicast1}, @in={0x2, 0x4e21, @local}, @in6={0xa, 0x4e21, 0x5, @dev={0xfe, 0x80, [], 0x25}, 0x4}], 0xa0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0xc002) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:35:11 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r0, 0x20000110}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:35:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227e, &(0x7f00000000c0)={0xd00}) 03:35:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="000d00000000000000000000f3f1effd0f234f1f023da38b9f62415c133a2d3bd90d7c46899ff2d12bb6a0b7f9d310c187"]) 03:35:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227f, &(0x7f00000000c0)={0xd00}) 03:35:11 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8848}}}}}}}}}, 0x0) 03:35:12 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8864}}}}}}}}}, 0x0) 03:35:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2282, &(0x7f00000000c0)={0xd00}) 03:35:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:35:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_i0ize'}}, {@data_err_abort='data_err=abort'}]}) [ 983.680545][T15781] EXT4-fs: 5 callbacks suppressed [ 983.680556][T15781] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i0ize=0x0000000000000000" or missing value 03:35:12 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r0, 0x10, 0x8}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:35:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:12 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8906}}}}}}}}}, 0x0) 03:35:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2283, &(0x7f00000000c0)={0xd00}) 03:35:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x1) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:35:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_iXize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2284, &(0x7f00000000c0)={0xd00}) 03:35:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:35:12 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xf000}}}}}}}}}, 0x0) [ 984.192500][T15789] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iXize=0x0000000000000000" or missing value 03:35:12 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB]) 03:35:12 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xf0ffff}}}}}}}}}, 0x0) 03:35:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2285, &(0x7f00000000c0)={0xd00}) [ 984.322920][T15809] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iXize=0x0000000000000000" or missing value 03:35:13 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r0, 0x10, 0x8000000}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:35:13 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1000000}}}}}}}}}, 0x0) 03:35:13 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0xdbdd, 0x24100) r1 = getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000380)={{{@in=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) r3 = getegid() sendmsg$unix(r0, &(0x7f0000000500)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000340)=[{&(0x7f0000000200)="b740528ba52d4896496a611da585e49ff8bc01be4dca0a175cc2e919801923d2bd11c30577e9108dda12a48b2bdb929034e6408cce50cc2a7fd10901a926cb429d7fdadf92e9eb40aec089cda447d10ab4f6247568b334456e611487080d0b8ade0ca5ef34eafcb8e7a6f2afde", 0x6d}, {&(0x7f0000000280)="58ba8a7b94edd786baaf7c19ad6685de41e67f7a69c3de8bc761a51bb5ade907db5252e2eced33352acce7c4e48d4756f7aa5f9756fd93e70f08a456bf02ec008aecf014dc72d5062eeff5f82b59256f6a31485b845369ac644451cfab6ee871ef7b6b0a045303fe9f44f1490e8d2d31366f4aa8eed5fb7d898a10e866cac8f2c5b760f529b14fe865ecb5b52aa9381c866a33cbea7ecc11393857fe0ab072ac45078337c25319d165c1210385", 0xad}], 0x2, &(0x7f00000004c0)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}], 0x20, 0x15}, 0x800) clock_nanosleep(0x0, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e21, 0x1, @loopback, 0x2}}, 0x0, 0x7}, &(0x7f0000000600)=0x90) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000640)={r5, 0x3e}, 0x8) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000700)={0xa, &(0x7f0000000680)=[{}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f0000000740)={r6, 0x2}) r7 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x4, 0x230080) ioctl$IMHOLD_L1(r7, 0x80044948, &(0x7f0000000100)=0x2) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f00000000c0)={0xd00}) 03:35:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_icize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2286, &(0x7f00000000c0)={0xd00}) 03:35:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x230f, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2287, &(0x7f00000000c0)={0xd00}) 03:35:13 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000000}}}}}}}}}, 0x0) 03:35:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x319, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) syslog(0x5, &(0x7f0000000100)=""/27, 0x1b) [ 985.106100][T15829] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_icize=0x0000000000000000" or missing value 03:35:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2288, &(0x7f00000000c0)={0xd00}) 03:35:13 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8000000}}}}}}}}}, 0x0) 03:35:13 executing program 4: syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xfffffffffffffff9, 0x20000) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xbadd, 0x4, 0x7, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfff, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffd, 0x129, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_config_ext, 0x10250}, 0x0, 0xffffffffffffbfff, r0, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x80000000) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000000c0)={0xd00}) [ 985.215789][T15851] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_icize=0x0000000000000000" or missing value 03:35:14 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r0, 0x10, 0x800000000000000}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:35:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2b00, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:14 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8060000}}}}}}}}}, 0x0) 03:35:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x5, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\'']) 03:35:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2289, &(0x7f00000000c0)={0xd00}) 03:35:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_idize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:14 executing program 4: syz_open_dev$vbi(&(0x7f0000000240)='/dev/vbi#\x00', 0x0, 0x2) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x42}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)=@alg={0xe0, 0x10, 0x0, 0x70bd2b, 0x25dfdbfb, {{'drbg_nopr_hmac_sha384\x00'}, [], [], 0x2000, 0x2400}}, 0xe0}, 0x1, 0x0, 0x0, 0x80}, 0x10) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:35:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5382, &(0x7f00000000c0)={0xd00}) 03:35:14 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xd000000}}}}}}}}}, 0x0) [ 986.018858][T15869] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_idize=0x0000000000000000" or missing value 03:35:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="dd92c9e20000000085000000"]) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f00000002c0)={0x0, "49d4e7eed6d7cda882d7ce77653a1d0864b1dbfd938be20ad3790d1cc0a30199", 0x3, 0x8ca6, 0x9bd, 0x850007, 0x4}) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) clock_gettime(0x3, &(0x7f0000000040)={0x0, 0x0}) timerfd_settime(r2, 0x1, &(0x7f0000000200)={{}, {r3, r4+30000000}}, &(0x7f0000000240)) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f0000000340)={0x0, {0x3, 0x1}}) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0xbc, 0x7f, 0x10000, "acef2898a818143ccd96ab32be754e3be4df0d89f70fcc4ebe87cc8f91547c05689968b3f2d3a2999203c853f93858038aa8df7242018f222ea85a380a9f3cc42228952ec4b1f9bf1b7c2c15df928c4868b3fd5c1138276ef2b932f871c0ba1288d08b98be4d863e129ba4deeb303c5068d62db3a1e887b308d610027503482651ae2a403d4669ff743e9851c8139d3ea339ca900299cf28a0eaabbb7d8896e4208348d0f44e57b2353b3e3cb2fb7b67a89e469dbbf2d1a8fd2d8d12"}) r5 = getpgrp(0x0) ptrace$peekuser(0x3, r5, 0x7f) 03:35:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5385, &(0x7f00000000c0)={0xd00}) 03:35:14 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x20000000}}}}}}}}}, 0x0) [ 986.128626][T15887] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_idize=0x0000000000000000" or missing value 03:35:15 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0, 0x8}], 0x2, 0x0, 0x0, 0x0) 03:35:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x4) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="000d0000000000fb00000000"]) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8, 0x402040) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000040), 0x4) 03:35:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5386, &(0x7f00000000c0)={0xd00}) 03:35:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_iiize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:15 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x28000000}}}}}}}}}, 0x0) 03:35:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2d00, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5421, &(0x7f00000000c0)={0xd00}) 03:35:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="010d00000000477200001000"]) 03:35:15 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x30000000}}}}}}}}}, 0x0) [ 986.908133][T15906] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iiize=0x0000000000000000" or missing value 03:35:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5450, &(0x7f00000000c0)={0xd00}) [ 987.022247][T15919] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iiize=0x0000000000000000" or missing value 03:35:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x208000, 0x0) sendmsg$alg(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="52268a08e7428bae26cf5800421712db7e1e770465b9acefa8242ce4250e768de237b9d119cbbe80de46a83f4f51548d5d3e4894c07ca748ebc245f0eb1d9fb02c16614b05e74b643cad2c6b2bf1e7f07d99652370aac72e21187e3cdeed63545a730b8f567c35ea99ff7e2844750c005d63775b5906bd421699810838f3b18eba8bad1d2e53238fc16660149ad62e1b0c61fc2cb31247f438ea2ac43669f6d8a384f370df7b36a9", 0xa8}, {&(0x7f00000001c0)="2e1e73fd54ccf28c6d33b00742230dc3b697f82f6572cf1f4908a2a4fec998e923438867791e13481893a81d60a7b35cf6cc5e76688b9bd6e59802ec37b4491fc41a9f4dffb2cc70600417a190ade4ac0cf7486c0c21318c8cf2c362719d7d472ef85cd2dd7166c4c8ab200c1cb0bf9e81a12dc2cd5906b45b25e8017ce4f67cde1a614db240deb2207ab7115c3bd017513d7dde6691593c007103d4d5a15dc7bdf04548a44b", 0xa6}, {&(0x7f0000000280)="a9aae6d1e340b5f619ddc6e4349e520aee1c2c58b47cdeebe449d09ce2aea64f1544fc976aa1318285a6745406dc206ce02d5daad5da91f4d28cddae0d279d02a171f215675c4e78a36168566b6827657687fa36ca10b7d2460d386d3edea2fbd59156343d3a92b00298811a1570f425b5fed79e68513f07e130649a63d2518344febaf14aa16529a62cd753270fe17c52fee9f7be1d2b3f1f1570a6dff613b7b38ebec8", 0xa4}, {&(0x7f0000000340)="8ff91b7208331c757887d4f8adc4404dfce124b09defa617059ac2c8496100a552695c9a53984091b9e8b0b68851379943c411479de92d17e7bcc4dffd1569ff80883a28e9e6507bf39457c30d8294bf8aad472a0caaf7fa5237a3630bb3cfe2e5f77bee9bcad66bd3e634580ca03c40f80d2cb94503aba3b7c49a0bd57de16104f95bd7b3d49c80c01ad4c5dbdd13e181d3d933d1924e70e0e98875496c1aca7c11713c09c46f72a3e9ecd62fc393c8796a8a52e5efd18c97103db51c4e494d95c0aa6293e04a6ef8780a7cef33bb62d6250e99df", 0xd5}], 0x4, 0x0, 0x0, 0x20040000}, 0x4) 03:35:15 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3f000000}}}}}}}}}, 0x0) 03:35:16 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0, 0x8000000}], 0x2, 0x0, 0x0, 0x0) 03:35:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_ilize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x3f00, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:16 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x43050000}}}}}}}}}, 0x0) 03:35:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5451, &(0x7f00000000c0)={0xd00}) 03:35:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) prctl$PR_SET_MM(0x23, 0xe, &(0x7f0000ffb000/0x2000)=nil) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:35:16 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000040)={'nr0\x00', 0x6}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000000c0)={0xd00}) 03:35:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5452, &(0x7f00000000c0)={0xd00}) 03:35:16 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x48000000}}}}}}}}}, 0x0) [ 987.917642][T15951] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ilize=0x0000000000000000" or missing value 03:35:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400, 0x0) execveat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)=[&(0x7f0000000100)='\x00', &(0x7f0000000140)='\x00', &(0x7f0000000180)='(trusted^\x00'], &(0x7f0000000280)=[&(0x7f0000000200)='ppp0\x00', &(0x7f0000000240)='[system\x00'], 0x400) 03:35:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x5460, &(0x7f00000000c0)={0xd00}) 03:35:16 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x60000000}}}}}}}}}, 0x0) 03:35:17 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0, 0x800000000000000}], 0x2, 0x0, 0x0, 0x0) 03:35:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f00000001c0)='/dev/sg#\x00', 0xffeff7effffffffb, 0x648002) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:35:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x4000, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xa300, &(0x7f00000000c0)={0xd00}) 03:35:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_ioize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:17 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x800e0000}}}}}}}}}, 0x0) 03:35:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xa400, &(0x7f00000000c0)={0xd00}) 03:35:17 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x80350000}}}}}}}}}, 0x0) 03:35:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="200000001558aaedf5be92341e62300c334774c900000000000000000000020400f9ac7a881c16c9c8de09000000cc11b922f93fbe05b748a624596276c63ea87037de1cc4273492df6df72bce385403e3acb13f2b83db83b743f2563c1eafdee376012d4d6737dc1cf19f934888c7ab7ba140668282f26d6dc32c59cb7948b68d31f4680e7a51513a3ab2966b7f116529beebbc00000000000000"]) [ 988.842264][T15989] EXT4-fs: 1 callbacks suppressed [ 988.842275][T15989] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ioize=0x0000000000000000" or missing value 03:35:17 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x81000000}}}}}}}}}, 0x0) 03:35:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x40049409, &(0x7f00000000c0)={0xd00}) 03:35:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) [ 989.062414][T16008] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ioize=0x0000000000000000" or missing value 03:35:18 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0, 0x0, 0x8}], 0x2, 0x0, 0x0, 0x0) 03:35:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x4800, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:18 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x86ddffff}}}}}}}}}, 0x0) 03:35:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x4020940d, &(0x7f00000000c0)={0xd00}) 03:35:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x2100, 0x0) ioctl$SIOCRSACCEPT(r0, 0x89e3) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x1, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000000c0)={0xd00}) 03:35:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_ipize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:18 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x88470000}}}}}}}}}, 0x0) 03:35:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xc0045878, &(0x7f00000000c0)={0xd00}) 03:35:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x800) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000000)) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="0012966062e769c7728a6bd3"]) [ 989.742475][T16020] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ipize=0x0000000000000000" or missing value 03:35:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000001b000000"]) 03:35:18 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x88480000}}}}}}}}}, 0x0) 03:35:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xc0045878, &(0x7f00000000c0)={0xd00}) [ 989.898242][T16039] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ipize=0x0000000000000000" or missing value 03:35:19 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0, 0x0, 0x8000000}], 0x2, 0x0, 0x0, 0x0) 03:35:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000000)={0x52b, 0x0, 0x2}) 03:35:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_iuize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x4c00, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xc0189436, &(0x7f00000000c0)={0xd00}) 03:35:19 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x88640000}}}}}}}}}, 0x0) 03:35:19 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x88a8ffff}}}}}}}}}, 0x0) 03:35:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xc020660b, &(0x7f00000000c0)={0xd00}) [ 990.618999][T16057] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iuize=0x0000000000000000" or missing value 03:35:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x79, 0x3fffd) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000000)) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) syz_open_dev$vcsn(&(0x7f0000000400)='/dev/vcs#\x00', 0x9, 0x400000) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000040)={0xc, ""/12}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000380)={r2, 0x6, 0x0, 0xd5, 0x3}, &(0x7f00000003c0)=0x18) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e21, @empty}}, 0x7079, 0x7f}, &(0x7f0000000100)=0x90) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @remote}}, 0x1, 0xffff}, 0x90) 03:35:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x3fc, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) getcwd(&(0x7f0000000000)=""/13, 0xd) 03:35:19 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x88caffff}}}}}}}}}, 0x0) 03:35:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xc0481273, &(0x7f00000000c0)={0xd00}) [ 990.792942][T16077] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iuize=0x0000000000000000" or missing value 03:35:20 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0, 0x0, 0x800000000000000}], 0x2, 0x0, 0x0, 0x0) 03:35:20 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x89060000}}}}}}}}}, 0x0) 03:35:20 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000080)=0x7, &(0x7f00000000c0)=0x4) r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0xfffffffffffffffe, 0x200000) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="000d00000000000000000000a78e37e61cef0cf91c3b9a67f46ff70e80ee33bde5c295a96aa2ee06d8d786b8409529253b4a235aa99a77172ca9918737c76ef855ff69e7ea9b89377d693dc65434f77731c63d050b6ae07e9c7eb50fbde0b14da9ed5ca871"]) 03:35:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_ixize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0xffffff1f, &(0x7f00000000c0)={0xd00}) 03:35:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6800, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0x340}) 03:35:20 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xffffa888}}}}}}}}}, 0x0) 03:35:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) [ 991.622332][T16098] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ixize=0x0000000000000000" or missing value 03:35:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd02}) 03:35:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x81, 0x1b8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)={0x33, 0x8, 0x42ab4852, "86cad16d968284aacf3953a84463148e2d20925edb44f4f1467a8cb6395269052e35bb908f21741c8d8fd94f74a27846a4491d"}) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="006d64b7c3ab1e1cc9d46159c1b2bc3afd08000000000000000000"]) 03:35:20 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xffffca88}}}}}}}}}, 0x0) 03:35:21 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0}], 0x2, 0x0, 0x0, 0x8) 03:35:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_i\x8eize'}}, {@data_err_abort='data_err=abort'}]}) 03:35:21 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xffffdd86}}}}}}}}}, 0x0) 03:35:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd04}) 03:35:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7ff, 0x103000) sendmsg$alg(r1, &(0x7f00000009c0)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000040)="52382ca9c41099aaf9", 0x9}, {&(0x7f0000000100)="ef659696caa995ac14dfd7952cd69533efa7c60907df3f0f8140b78655a4ed5c0b8eedafed17389c7b82468395692c48aedb2e7992133bdcc52c7b99fd3df210501c2e09578012ceb7ff7224a2332160a0fba1abb6d58abb32b24585d3e74525c0c244639f889c4781b299adada262f7517fcce1dd4410cffd87549655ead61ba48ffdc103e3d4682449064b7585eaaaf3f596b406b98319d43cfae67fa49fa464090e3834a1dd85c9a78db518eb34635e8b49b029d6075bc15ee0b52e06824c1f5aa035b23fce1b247a94b6506ba5cf8b8446c61f5ce13ea94d727aeda2f3a1572ce42c00b52b", 0xe7}, {&(0x7f0000000200)="7eaeecd16fd09332e740393c081f086c269678c4bdafcad7a007f8", 0x1b}, {&(0x7f0000000240)="2dcae5830e20bca564098ff09f7531ead8398666cd13f38540e9c302a46ed3ae0790c1a6b9128aaff1b4f8909df3ef0f2234c3dbacbaa4766c0985c9f0aa40e56d4d634207f593f2793806c9928efe7c0b7e54a71c1965e79da5060b8c3571087042", 0x62}, {&(0x7f00000002c0)="2091328168339d93ebfcd4d93af84c8a229d71ea49aa260b37937cf65cb2362911131bc370a9319a218bc5c03235505bf0232a61b7a1", 0x36}, {&(0x7f0000000300)="8de47395efb6217dacc419c9ef698d88ac2b71d6989b06990d81169fb15fe4b72ab1e849d015e192b09d350fbd0a969528a13bd7d640a78c9c689854cc0ba06895d00a664b4c06d08b04baa5d4ee45054658dcec9785fe379bb28bc6b8b111a6d38ba3b33b60ea200821c35804c09a563e9c571e105f10c4590f0f6a37c4ab2f05525ef5c715401c8896fd868d0c2076f81a4ab8153fb62ce3a69221a5b53f705f238037fcfce0d5cf58ae3012d8011d5304f606f85d35b0dd825810cfd173273a135be314807eb24d558f64af0dea", 0xcf}, {&(0x7f0000000400)="4928c9c5cb247d9dc06f1720b5cb88785720be8db5b66b4c4d19c23d3a471359a972f5af741c216437f17900b2adef43c53356d8847c50c4250362578a5a8bc097b81bc39e67a26d875e2d8ff229cf2ede0b83463e69905f00e3818fa4f58628393de02500b8ae542d33d1c1ee6afe4dea42234cc592368f5d2e08d3c52381690d044dcaf0a574ef0dc8de0990238a100069a2af71329afa3dd576e288190295ea836969666d6d287b648eb70069716216ebd561cbb693e593553057218d6eae9fd16fb5b833bddfc2e2b28dc24b048135c867011025fc76d87961def24890688fa7ce74c19e84992f4f380a3a597f81cedb8a", 0xf3}, {&(0x7f0000000500)="56418ce8006e46a411134de14ae19471388d3e5367537bbe7a4c840ace82d855d36f51b900b514a4dbaaac1afb6b485a2dd755d2e2b3e77a2c81a60db5fda5070f9b9c3ebb0b8eb029fbc219da73f2e964ee692b0eee8dfc62fc0308df52e4309a24d5bbfcc17beefea968d7570d68dcda7ba8ab0a8dc638727d84ec730a3613d471c4d6646be27a30bf7f20927e3de9bd9746fee3d8a25208f4fffdbb6f489d6a8eb9fd316b913c4ffce69805a9487eb4b19aef345b99b3cbebdeba994bfc170aa237396e244d280aad3aed2c7ded671f2b3a6061d1bfb75e7814ea1d76854338778497d0f89309a4e16ecc4e6539acd7", 0xf1}, {&(0x7f0000000600)="2b7385c5d4341bcb07b995cac048f23410d26178f6d6a0df3a9bcad70065acc3adac9e4bf7700814f78afe1c083513cb6088ca74d8c404994985afbcfc6590f76e3f2674c75ce2a917dc4018b3db0767aae4d03b7f23889e6beaae838a68ab6b0f2e32c9c384dfd69a58263f3ef3531939f9bad1efac25cccdaa7661cd5b93eddbb18d036755c927650dc4d42828946ae8", 0x91}, {&(0x7f00000006c0)="911bf07a9be82658780b633ed61718d2bdf6f2d6f817fa8eade29aa9566e322e12a0ad1bc059d6ea0af1ece78c2395616a2d086ade4412d9ddb5951c7ed95120db0428bedf9903aa6c38d508fa5d8f4b76f4ef5d39f20f23f77c59423327f441206b7d62b50d1cfa33464063a1611b1e19a54a107cbf98d4a7155db473b38c875abeb784346e2602f23bac80eb103bd3db0cc2754106525dbd94bbdc1bcf3a0dfa964178c9afbebcfbca17c65922d4cef60e8d6b9b5aaaab32d5dff2d56188b6dc5703b01ed87bc5b2e32b4072e53e4fbd4dfe12a4e8db04c5", 0xd9}], 0xa, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x138, 0x10}, 0x0) r2 = msgget(0x2, 0x10) msgsnd(r2, &(0x7f0000000c00)={0x3, "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"}, 0x1008, 0x800) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:35:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6c00, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd09}) 03:35:21 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffff000}}}}}}}}}, 0x0) 03:35:21 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000000)={'raw\x00', 0x3, [{}, {}, {}]}, 0x58) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000000c0)={0xd00}) [ 992.562552][T16136] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iŽize=0x0000000000000000" or missing value 03:35:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd0d}) 03:35:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x4000, 0x0) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000040)=ANY=[@ANYBLOB="0400000037e044ce962bd018536b"]) 03:35:21 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xf0ffffffffffff}}}}}}}}}, 0x0) [ 992.751002][T16154] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iŽize=0x0000000000000000" or missing value 03:35:22 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0}], 0x2, 0x0, 0x0, 0x8000000) 03:35:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x7400, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd1b}) 03:35:22 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit(0x0) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000000c0)={0x0, 0x0, 0x3}) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mixer\x00', 0x2000, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') getresuid(&(0x7f0000000540)=0x0, &(0x7f0000000580), &(0x7f00000005c0)) lchown(&(0x7f0000000500)='./file0\x00', r4, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f00000004c0)={&(0x7f0000000340), 0xc, &(0x7f0000000480)={&(0x7f00000003c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="00072dbd7000fedbdf25060000004400030008000500ac1e01011400020076657468315f746f5f68737200000000080007004e230000140002007465616d3000000000000000000000000800030003000000080004000002000008000600080000000c00030008000500000097fc2800020014000100ac1e0001000000000000000000000000080006006309000008000b00000000000800050009000000"], 0xa4}, 0x1, 0x0, 0x0, 0x24004000}, 0x24000880) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') fdatasync(r1) r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x240, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0xc93, @local, 0x1}}, 0x8000, 0x9, 0x8, 0x1, 0xda56}, &(0x7f0000000200)=0x98) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r5, 0x800443d2, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{}, {}, {}]}) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000240)={0x7, 0x201, 0x5a, 0x1c, r6}, 0x10) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000000)=0x40) 03:35:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_is\nze'}}, {@data_err_abort='data_err=abort'}]}) 03:35:22 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000000}}}}}}}}}, 0x0) 03:35:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd1d}) 03:35:22 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x200000000000000}}}}}}}}}, 0x0) [ 993.510835][T16174] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_is [ 993.510835][T16174] ze=0x0000000000000000" or missing value 03:35:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd37}) 03:35:22 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x800000000000000}}}}}}}}}, 0x0) 03:35:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xda4}) 03:35:22 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x806000000000000}}}}}}}}}, 0x0) 03:35:23 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0}], 0x2, 0x0, 0x0, 0x800000000000000) 03:35:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x7a00, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0x40000}) 03:35:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_is\x8eze'}}, {@data_err_abort='data_err=abort'}]}) 03:35:23 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xd00000000000000}}}}}}}}}, 0x0) 03:35:23 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000000c0)={0xd00}) write$P9_RSTAT(r0, &(0x7f0000000100)={0x68, 0x7d, 0x2, {0x0, 0x61, 0x7, 0x100000000, {0x48, 0x1, 0x4}, 0x4000000, 0x1, 0xea, 0x3ff, 0x8, 'vmnet1:$', 0x0, '', 0x1d, 'wlan0em0.}keyring\\.wlan0self:', 0x9, '/dev/sg#\x00'}}, 0x68) [ 994.424133][T16214] Unknown ioctl 21532 03:35:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0x20000dce}) 03:35:23 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000000000000000}}}}}}}}}, 0x0) [ 994.452301][T16214] Unknown ioctl 21532 03:35:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x800) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) [ 994.512218][T16216] EXT4-fs: 1 callbacks suppressed [ 994.512231][T16216] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isŽze=0x0000000000000000" or missing value 03:35:23 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2800000000000000}}}}}}}}}, 0x0) 03:35:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x2}) 03:35:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) [ 994.801134][T16240] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isŽze=0x0000000000000000" or missing value 03:35:23 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2002, 0x0) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000240)={0x40000000}) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f00000001c0)=r1) r2 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r2, 0x10}, {r2}], 0x2, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x2c7a, 0x1000}, &(0x7f0000000140)=0xc) 03:35:23 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3000000000000000}}}}}}}}}, 0x0) 03:35:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xedc0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x4}) 03:35:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000000000)) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="004d000000000000000000003730bb009c94ff108a6eec27cb655c35a44c1a83ca9f2685f6e117a0d1f9b5e427efa690c624eee21504774da06f0b6bed609f212f119975169f6f2cce8ac28c5ce259e0012c770741f3"]) 03:35:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isi\ne'}}, {@data_err_abort='data_err=abort'}]}) 03:35:24 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1c, 0x109003) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x7, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000000c0)={0xd00}) 03:35:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x9}) 03:35:24 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3f00000000000000}}}}}}}}}, 0x0) [ 995.410485][T16259] QAT: Invalid ioctl [ 995.419162][T16250] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isi [ 995.419162][T16250] e=0x0000000000000000" or missing value [ 995.419515][T16259] QAT: Invalid ioctl 03:35:24 executing program 4: modify_ldt$write(0x1, &(0x7f0000000040)={0x2, 0x20000800, 0x2000, 0x9, 0x3a, 0x0, 0x7, 0x6, 0x3, 0x101}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x8100, 0x0) 03:35:24 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4305000000000000}}}}}}}}}, 0x0) 03:35:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xd}) [ 996.209571][T16266] QAT: Invalid ioctl [ 996.214274][T16266] QAT: Invalid ioctl 03:35:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0x6f, &(0x7f00000000c0)=0x8, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x200003, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1f, &(0x7f0000000040)=0x1, 0x4) prctl$PR_CAPBSET_DROP(0x18, 0x19) r2 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000140)=0x1, 0x4) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r2, 0x10}, {r2}], 0x2, 0x0, 0x0, 0x0) 03:35:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x400000, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isi\x8ee'}}, {@data_err_abort='data_err=abort'}]}) 03:35:24 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4800000000000000}}}}}}}}}, 0x0) 03:35:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x101000, 0x0) openat$cgroup_procs(r1, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) ioctl$RTC_AIE_ON(r1, 0x7001) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000100)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) 03:35:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x10}) 03:35:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\r\x00e\x00\x00@\x00\x00\x00\x00\x00']) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x163) connect$vsock_stream(r1, &(0x7f0000000140)={0x28, 0x0, 0x2711}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000100)={0xbd1b, 0x2, 0x1, 0x81, 0x3, 0x8}) 03:35:25 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6000000000000000}}}}}}}}}, 0x0) 03:35:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x1b}) [ 996.390170][T16294] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiŽe=0x0000000000000000" or missing value 03:35:25 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x800e000000000000}}}}}}}}}, 0x0) 03:35:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x4c, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x8, 0x23180, 0x4f28e801, 0x7ff]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x101c00) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x4c, r4, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xa4126efb7f5393ed}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xffffffff80000001}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40}, 0x8000) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x3, 0x0, 0x2, 0x7fff}) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="000d000000030000000000000e1cae58034cdb7f000000f387eac50c4236b0ac4368871bad1cedda7118f49951fc4d79b405223fc7273b7e8def5d2395d89057cb159e9cf814d5407b428af3b4ba8c789313443290962638e33b00000000000000000000000000000000000000000000000000000000"]) 03:35:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x1d}) [ 996.522610][T16307] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiŽe=0x0000000000000000" or missing value 03:35:25 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000000)) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0x1000000000000b) r1 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x7, 0x10000) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000280)=0x1) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x400, 0x80) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, r3, 0x408, 0x70bd26, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24000800}, 0x200008d5) ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0}], 0x2, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000380)={&(0x7f0000000300)=""/97, 0x100000, 0x800, 0x6}, 0x18) openat$vhci(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhci\x00', 0x800) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) 03:35:25 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8035000000000000}}}}}}}}}, 0x0) 03:35:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x1000000, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isiz\n'}}, {@data_err_abort='data_err=abort'}]}) 03:35:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x37}) 03:35:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x50, r1, 0x102, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x69}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1c}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7c}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000080}, 0x41) r2 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) 03:35:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xa4}) 03:35:26 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8100000000000000}}}}}}}}}, 0x0) [ 997.356970][T16329] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz [ 997.356970][T16329] =0x0000000000000000" or missing value 03:35:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="40de001edf2bad8b332a17f78450b12c6790713019702f8043be1f43d3e602ef9a12e471c53e886663904fc784cb3942991ab8ade91230ee2908b89dab4d89cc390771b1afc76b86a6aec838444ddea9ca6d1ff3c72860309361f96b21fd3fac8674f892c40ab9647e96d4e2993fbaf17ef793b93ffb889daf2de934f132965c82165394e9b269e5de02c17bec3d0843f24121d37c6137"]) 03:35:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x900}) 03:35:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x5, 0x7b4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:35:26 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x86ddffff00000000}}}}}}}}}, 0x0) [ 997.542294][T16344] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz [ 997.542294][T16344] =0x0000000000000000" or missing value 03:35:26 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000140)) ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0}], 0x2, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) ptrace$getregset(0x4204, r1, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=""/55, 0x37}) 03:35:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isiz%'}}, {@data_err_abort='data_err=abort'}]}) 03:35:26 executing program 4: socket$inet(0x2, 0x0, 0xfc00000000000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000140)=0xffb5) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000000c0)={0xd00}) write(r0, &(0x7f0000000180)="e8b632dd4fd5b5b4e3833d15252649bb6fb981772ba1716028ed4eaa050212668462ef64da0897278e3fe2d21e9ff8e5b7a012835ca5d26b02b9c2a1b48a322f876db57c5b46520927e4fa0f0bb2ba4d41e42b09c3024c5b652f06a8e8a231b44b81bb364ea8843079edc7ca7c0dc1b266d62915e3c3b495bfec6c3f4bafd81e820fcf852f5272630f7b31ee881f65f5479fe3d356dd0f073caab1db8517d0f567b6377076973927b07776610bae05fb1061dc627e7f92905a1c901f5dea7c878594b5befe1ecb707a1a0d3a32e99c409c46", 0xd2) 03:35:26 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8847000000000000}}}}}}}}}, 0x0) 03:35:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2000000, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xd00}) 03:35:26 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8848000000000000}}}}}}}}}, 0x0) 03:35:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x1466}) 03:35:27 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x20000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000ff000000000096c80400750000"]) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000100)=""/211) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000000)=0x1e) [ 998.355137][T16372] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz%=0x0000000000000000" or missing value 03:35:27 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8864000000000000}}}}}}}}}, 0x0) 03:35:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x1b00}) 03:35:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000140)={0x65, 0x101, 0x9d, "d1e89fbb6371780c2ee15c0e011d8d0e274e25c2c1f951783d9c1102fb401ab7a8fb1195b70b810ed8781802e7675f87e4480cadd40888d5d733885d79513559b56f2efb3f8052ee77aa13e0e9fccb5bc26bb6db13d255da61a8152f51826f3b6b3cbfa41b"}) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000100)={0xc, {0xfa7, 0xfc, 0x93, 0x10001}, {0x40e, 0xf80, 0xfffffffffffff9cd, 0x40}, {0x0, 0x9a7}}) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000040)) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000000c0)={0xd00}) 03:35:27 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000040)=0x7) ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0}], 0x2, 0x0, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x480000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000140)={0x3, 0x800, 0x4, 0x9, 0x252e, 0xbc37}) 03:35:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isiz\x8e'}}, {@data_err_abort='data_err=abort'}]}) 03:35:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x3000000, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:27 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x88a8ffff00000000}}}}}}}}}, 0x0) 03:35:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x1d00}) 03:35:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xe85b, 0x800) r1 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="455691d48563283c13235e869e2477", 0xf, 0xfffffffffffffffb) r2 = request_key(&(0x7f0000000300)='cifs.idmap\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)='em0&-%$\\.eth0\x00', 0xfffffffffffffffc) r3 = add_key(&(0x7f00000003c0)='cifs.spnego\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)="7c9780f40430288562dfb7c93297dfab8a7c57551e7391f63db614daff7502a1a97f9347f89b72af64b8f5f77bf7a5be9acdd12a2289e518b53c549efbb57b5a8105a017a4070a4691beccb994bf1dd8c5bb5b3115a0e8cdb9774061b06830c7c1c065094c5828ff85d37fb003d5f5964f17213b9822cb6d035441e21a58e7719c08679a801f8eb603f08040897617f916306d97bed738ea3459ed4810c7decef2e0fd0e9334a9473f4a0cdf972d51f045ec8e98f42f0914c6dc144a8f9cb1d9d0b8", 0xc2, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000540)={r1, r2, r3}, &(0x7f0000000580)=""/245, 0xf5, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f0000000040)={0x10000, 0x7}) sendmsg$can_raw(r0, &(0x7f0000000200)={&(0x7f0000000100), 0x10, &(0x7f00000001c0)={&(0x7f0000000140)=@canfd={{0x0, 0xffffffffffffffff, 0x20, 0x1}, 0x0, 0x3, 0x0, 0x0, "35da799388ca2fff53632912f264128a25cb094886e05fbac30c0040e41a8141f197c890d3f3d535db5299540379ee713e8f007367a9f5439965f5ff0cba2e47"}, 0x48}, 0x1, 0x0, 0x0, 0x1}, 0x8000) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000680)={0x0, @in6={{0xa, 0x4e20, 0xffffffffffffded7, @remote, 0x100000001}}}, &(0x7f0000000740)=0x84) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000780)={r4, 0x80000000000}, &(0x7f00000007c0)=0x8) r5 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f00000000c0)={0xd00}) 03:35:27 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x88caffff00000000}}}}}}}}}, 0x0) 03:35:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x2000}) 03:35:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101080, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000200)={&(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x2, 0x8, 0x3, 0x5}) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SIOCX25GDTEFACILITIES(0xffffffffffffffff, 0x89ea, &(0x7f0000000100)) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000000c0)={0xd00}) 03:35:28 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8906000000000000}}}}}}}}}, 0x0) [ 999.380231][T16419] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isizŽ=0x0000000000000000" or missing value 03:35:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x3700}) 03:35:28 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffff000}}}}}}}}}, 0x0) [ 999.537408][T16435] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isizŽ=0x0000000000000000" or missing value 03:35:28 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x4, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:35:28 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0x4f8900) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000100)={0x3, r0}) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000140)=ANY=[@ANYRES32=r1, @ANYRES32=r0, @ANYRESHEX=r1, @ANYRES64, @ANYRES16=r1, @ANYRESOCT=r0, @ANYRESHEX=0x0]) 03:35:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x4000000, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:28 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2}}}}}}}}}, 0x0) 03:35:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x3f00}) 03:35:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0xa}}, {@data_err_abort='data_err=abort'}]}) 03:35:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x4000}) 03:35:28 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8}}}}}}}}}, 0x0) 03:35:28 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000000c0)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYPTR=&(0x7f0000000000)=ANY=[@ANYRES32=r0, @ANYRES32, @ANYRESDEC=r0, @ANYRESDEC=r0, @ANYRES32=r0, @ANYPTR64, @ANYRESDEC=0x0], @ANYRES64=r0, @ANYRES16=r1, @ANYRES64=r0, @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRES32=r1, @ANYPTR64, @ANYBLOB="f8e225af36555e2b2008e7cd58973ed61a8b8141589275a0e1ddace0658ff5d8b153012abd937e000126a0f0adb40b5398cf0b128928cad2e8b25e4abe4a96fa639692d0008287d7a7dca769a85f8f967a1fdb280ac78c407b95a6a9a276100fe1222fe6113eb9eea9741dbeb4070c62198cda78dc9c7dd8ca5df5ff1afcd0f3a8e241b6db2597bfd435954f480c29b38d634d63834e6d739f4f1e"], @ANYRES32=r0]]) 03:35:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x6614}) [ 1000.252116][T16448] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize [ 1000.252116][T16448] 0x0000000000000000" or missing value 03:35:28 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xd}}}}}}}}}, 0x0) 03:35:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) [ 1000.395132][T16469] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize [ 1000.395132][T16469] 0x0000000000000000" or missing value 03:35:29 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0}], 0x2, 0x0, 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x400, 0x40) accept$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0x0, 0x6, {0x19}}, 0x18) 03:35:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x5000000, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xa400}) 03:35:29 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x28}}}}}}}}}, 0x0) 03:35:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0xf, 0xfffffffffffffffc, 0x1, "b3e5b9b40cd2dbf9bb4d69904d5623a00d44234336e964b6591e53fc1a9f4dd2b2de9e7688a7f534380cc3cd5b2461275f77b23d475dcdfb8141bd5292a9233eb1c0cece4a8e02f11f84832d55123c82477070709496c4d07114654afc218e3e478406ef8f6d60ee961a30ae6f4c208ee55300a574396bb6b0c094db4e1b1fd9d0a1cac81bbba947172e7e51b8e20ba48afd49a63d2be36b08993861e2c3956081c57f78aa7cb470295e5ef1"}) 03:35:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x25}}, {@data_err_abort='data_err=abort'}]}) 03:35:29 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x30}}}}}}}}}, 0x0) 03:35:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000100)=""/234, 0xea) userfaultfd(0x800) syz_init_net_socket$netrom(0x6, 0x5, 0x0) 03:35:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xd0000}) [ 1001.137883][T16487] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize%0x0000000000000000" or missing value 03:35:29 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x48}}}}}}}}}, 0x0) 03:35:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x80) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:35:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x100000}) [ 1001.282167][T16505] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize%0x0000000000000000" or missing value 03:35:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r1, 0x10}, {r0}], 0x2, 0x0, 0x0, 0xffffff9b) 03:35:30 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x60}}}}}}}}}, 0x0) 03:35:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x2, 0x1, &(0x7f0000001680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x4, 0x4) r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x3, 0x20203) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="3de576465517189715508ab4ff6e21048d3448c91ce24a38c5e38aa450b117b71426147925de41b5c7e4ce5c465927318248075051595cd9d1beed8800a5ed46f7e777d41d125d12dd42b9d1e39e1a5faff2a61de0913ff8913c8a5f49acb536c6e5b2feff6cb8f565456de49ba72d9d2591d919cefdf1cde7349467022792f2a7a20ba1e084517140672235a4778f0e1f0b5c4c559f2e86f254e8e989bb2d5d3d625cc3eb59d49866ea8c1f9737e8a5"]) 03:35:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x2b}}, {@data_err_abort='data_err=abort'}]}) 03:35:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6000000, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x200000}) 03:35:30 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xf0}}}}}}}}}, 0x0) 03:35:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x1000000}) 03:35:30 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000100)=0x53) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0xf, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000000c0)={0xd00}) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x4, 0x6, 0x7ff, 0x0, 0x4004}) [ 1002.122796][T16533] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize+0x0000000000000000" or missing value 03:35:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x2000000}) 03:35:30 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x543}}}}}}}}}, 0x0) 03:35:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x4000000}) [ 1002.252412][T16550] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize+0x0000000000000000" or missing value 03:35:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TIOCGPTPEER(r2, 0x5441, 0xfff) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r1, 0x10}, {r1}], 0x2, 0x0, 0x0, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0x3) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) 03:35:31 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dlm-control\x00', 0x800, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000600)) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000580)=0x21) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000640)=ANY=[@ANYBLOB="33000000ffffffff00000000c21ea7b990d4f1bd6ebb29780e62c727a96e76e2f56d6bee37b3806d23dee16a75522dc6273079fb29f31d9e3b56ce3e274f2ce4a34fb23906da7831bc49aa88d9094b40b73cd2897a7d766c"]) timer_create(0x4000000004000000, &(0x7f0000000100)={0x0, 0x8, 0x2, @tid=0xffffffffffffffff}, &(0x7f00000000c0)=0x0) timer_delete(r3) r4 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000140)={"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"}) ioctl$BLKBSZGET(r2, 0x80081270, &(0x7f0000000040)) 03:35:31 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x608}}}}}}}}}, 0x0) 03:35:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x7000000, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x9000000}) 03:35:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x2d}}, {@data_err_abort='data_err=abort'}]}) 03:35:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xd000000}) 03:35:31 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x689}}}}}}}}}, 0x0) 03:35:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x4000000000000) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0xf5aa8438c06103ef) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x7fff) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x2711, 0x2, 0x4000, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) [ 1002.969601][T16565] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize-0x0000000000000000" or missing value 03:35:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x1b000000}) 03:35:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x4, 0x109001) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000000)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000002c0)=0xe8) ioctl$SIOCAX25GETUID(r1, 0x89e0, &(0x7f0000000300)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r2}) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"]) 03:35:31 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x806}}}}}}}}}, 0x0) [ 1003.108419][T16585] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize-0x0000000000000000" or missing value 03:35:32 executing program 0: semget(0x3, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:35:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r1, 0x0, 0x9, &(0x7f0000000100)='/dev/sg#\x00'}, 0x30) kcmp(r2, r3, 0x0, r1, r1) r4 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(r4, 0x40045568, 0x17) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x1, 0x0) accept4$nfc_llcp(r5, 0x0, &(0x7f0000000200), 0x800) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f00000000c0)={0xd00}) 03:35:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x1d000000}) 03:35:32 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xd00}}}}}}}}}, 0x0) 03:35:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9000000, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3b}}, {@data_err_abort='data_err=abort'}]}) 03:35:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x200000c8}) 03:35:32 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xe80}}}}}}}}}, 0x0) 03:35:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)) mkdir(&(0x7f0000004080)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4b643a050000006c6c623a00"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1003.842235][T16608] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize;0x0000000000000000" or missing value 03:35:32 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2000}}}}}}}}}, 0x0) 03:35:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x37000000}) [ 1003.950904][T16622] ceph: device name is missing path (no : separator in Kd:) [ 1003.963212][T16624] ceph: device name is missing path (no : separator in Kd:) 03:35:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x10000000, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:33 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000000)) ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:35:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x8e}}, {@data_err_abort='data_err=abort'}]}) 03:35:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="000d00000000fd70747642553e47f261b984000000000000"]) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$PPPIOCGUNIT(r1, 0x80047456, &(0x7f00000000c0)) 03:35:33 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2800}}}}}}}}}, 0x0) 03:35:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x3f000000}) 03:35:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x1f000000, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:33 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3000}}}}}}}}}, 0x0) 03:35:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x40000000}) 03:35:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x10001, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="000d00000000001fc80000005842b030ed150c482cfa016627e03886698f61878016c1852ae1362aeebb3398bf294dce0cf304ac56e67b8bd85463f7ce6abc68455f81b455dc37ba2a3ad99029d40910cde35464751da70c8a65eea93f824e2c8c184349fa6a0e2d66d71004695195d8745f16896b75e6380000000000000000000000"]) 03:35:33 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3580}}}}}}}}}, 0x0) [ 1004.792174][T16651] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isizeŽ0x0000000000000000" or missing value 03:35:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffffffffffffc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0c10059674b1839aec9a04004eaf32d925672c5ae0e007f32bb0716d0100000000000000baac76326b52569853ef4c78d0adfa3b1d25077a905dc3da6e4bd5dec278ab9d136bbb4d0e3f42be344a5eeb4f76abfa059849a2d0a261a333d6cc9efd536484ae10"]) 03:35:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x66140000}) 03:35:34 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x6, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0x4, 0x70bd26, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000004) r2 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000200)=0xb) ppoll(&(0x7f0000000100)=[{r2, 0x10}, {r2}], 0x2, 0x0, 0x0, 0x0) 03:35:34 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3f00}}}}}}}}}, 0x0) 03:35:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2}}, {@data_err_abort='data_err=abort'}]}) 03:35:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x20000000, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xa4000000}) 03:35:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) 03:35:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xa5ffffff}) 03:35:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="90af5f7a2818f575e5df2273f6084f275b4005321f54de26adb05c21", 0x1c) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4080) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000200)={0x1da, 0x1ff, 0xffffffffffffff10, 0x6, 0x6}) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000580)={0x90, 0x1, 0x4, 0x64, 0x13, 0x7, 0x1f, 0x8, 0x2, 0x800}) signalfd(r1, &(0x7f00000005c0)={0x9}, 0x8) r2 = dup2(r0, r0) recvmsg(r2, &(0x7f0000000540)={&(0x7f0000000240)=@can, 0x80, &(0x7f0000000480)=[{&(0x7f00000002c0)=""/54, 0x36}, {&(0x7f0000000300)=""/106, 0x6a}, {&(0x7f0000000380)=""/200, 0xc8}], 0x3, &(0x7f00000004c0)=""/75, 0x4b}, 0x1) sendto$inet(r2, &(0x7f0000000100)="ce828c562e34288beb1dd8313b5e10d0f823cd9ead8ec4d8dd1612af7ad50f0afe7472160aa420d162da20bac28b6c44cbe51200b9c9e8e818eef98c193fd75e0939f8ef5699a722765bf194bccf40ada290cb82346cd480600124424f307d199e5e08a1fafac35b6c74ffcd76eb2fd69a14331fc6d9c2ada636d4aca594122954754baffbe772b7a5ccf269f42def305098ce26a9a52c52cb9183a6497a749782502128cf6dd33d127496b9c2f503d452", 0xb1, 0xc0, &(0x7f0000000040)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x25}}, 0x10) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000800000008000"]) 03:35:34 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4305}}}}}}}}}, 0x0) [ 1005.713240][T16687] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x0000000000000002,data_err=abort, 03:35:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xb8ffffff}) 03:35:34 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4788}}}}}}}}}, 0x0) 03:35:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x230f0000, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r1, 0x10}, {r1}], 0x2, 0x0, 0x0, 0x0) r2 = accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x800) fstat(r2, &(0x7f0000000200)) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x501000, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'team_slave_1\x00', 0x10}) getsockopt$TIPC_CONN_TIMEOUT(r3, 0x10f, 0x82, &(0x7f0000000180), &(0x7f00000001c0)=0x4) getitimer(0x1, &(0x7f00000000c0)) 03:35:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}, {@data_err_abort='data_err=abort'}]}) 03:35:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xc8000020}) 03:35:35 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4800}}}}}}}}}, 0x0) 03:35:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x200000, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:35:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2b000000, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:35 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4888}}}}}}}}}, 0x0) 03:35:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xfbffffff}) 03:35:35 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x40000000007, 0xfffffffffffffffc) r2 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x8001, 0x101000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000100)=0xb31c, 0x8) fsetxattr(r0, &(0x7f0000000000)=@known='trusted.overlay.origin\x00', &(0x7f0000000040)='/dev/sg#\x00', 0x9, 0x2) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="000d00000000000000000000ec8e1989f109e77e5983cb947e257164ad3da52509ef6942506396ce32c62f422ff461552bebbd23fc0ac923e5828b2574e72acb2757873df7e9ae8a2f2d826bca2dc00daaf490a041e28a9b3f7926490a2ea4141bbcb03e77199772ee8884c278a986b0e1cda356c138c85e958eaf32e1917ecdb671029cda019664a0977b5392ed6e490c5f18f6038fc144c019fb21d488c4c25cb144e7e87c4fb404e9695e999470b1491cd0680cfc685d16049539a469f0bf7c16076630ad9010ba2e711839e603a3b12781f1b22bd2b89ab8f622a0d8da"]) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB="04000200ff360200"], &(0x7f0000000180)=0xc) accept$nfc_llcp(r2, &(0x7f0000000340), &(0x7f00000003c0)=0x60) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000002c0)={r3, 0xfffffffffffffff9}, &(0x7f0000000300)=0x8) [ 1006.623802][T16727] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x0000000000000003,data_err=abort, 03:35:35 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6000}}}}}}}}}, 0x0) 03:35:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000040)={0x2, 0x0, 0x6, 0x1, 0x0}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000100)={r2, 0x8c, "66563aa324b34aaa5049f0f5eeb3c73dc49d81b812394e6d42ea273aec4fc71c3656502b48e96b13e896c46ce2867ff0a8cefcad068db3ffcc8ac2d2574bab6925eb20b0d56f784ac21e91c33b898d599253e6a4d98caf0b1b3df11a1fb8e5fc8d8961bf84b348e7056b402365af904c2a222f4ab6ada8d8c2ac71bcbb24cbfa54402b1388dfb113a300154f"}, &(0x7f0000000440)=0x94) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="000d0000000000000000000000a544e78db4546a4d04ed5d294f869936f1f7675387654570aaa6fc2c0a1bd7bcc7c52d7c452d165bf6fa2af6d971efd7b33af4595ad0fa66c554b35047530772511b71d9f41736e449b505aa76cb6f3fb38ea0fdcf87e80c73a638c75820c3c6d8b43329a719db1076837daadb4018ec5e98dc2451f516a8b876b6c7257f7782fa8ed623372cd6fa28ea02a03e978adaf03d09f54f1be3497433a08337904fe81617b8ac66f39d92beb4a801abefc36c626d80a20069ada9604b4e8400000000"]) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f00000002c0)) 03:35:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xfdfdffff}) 03:35:36 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0}], 0x2, 0x0, 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1000, 0x201) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x7f, 0xf410, 0x7fff}) 03:35:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x4}}, {@data_err_abort='data_err=abort'}]}) 03:35:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0xfffffffffffffffe) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:35:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2d000000, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:36 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6488}}}}}}}}}, 0x0) 03:35:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xfffffdfd}) 03:35:36 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x800e}}}}}}}}}, 0x0) 03:35:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xffffffa5}) 03:35:36 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x8, 0x8000) getpeername$netrom(r0, &(0x7f0000000100)={{0x3, @rose}, [@remote, @netrom, @remote, @remote, @rose, @bcast, @netrom, @default]}, &(0x7f0000000180)=0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000000c0)={0xd00}) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) [ 1007.584850][T16765] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x0000000000000004,data_err=abort, 03:35:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xffffffb8}) 03:35:36 executing program 4: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x4, 0x181000) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000100)={0x4, [0x4, 0x80000000, 0x7, 0xde4]}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000000c0)={0x0, 0x2}) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x6100) socket(0x9, 0x80006, 0x7) 03:35:36 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8035}}}}}}}}}, 0x0) 03:35:37 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) fgetxattr(r0, &(0x7f0000000000)=@known='user.syz\x00', &(0x7f0000000040)=""/35, 0x23) ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:35:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x89e) 03:35:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xfffffffb}) 03:35:37 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8100}}}}}}}}}, 0x0) 03:35:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5}}, {@data_err_abort='data_err=abort'}]}) 03:35:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x10000000000}) 03:35:37 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8847}}}}}}}}}, 0x0) 03:35:37 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000000c0)={0xd00}) fcntl$dupfd(r0, 0x406, r1) [ 1008.453792][T16799] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x0000000000000005,data_err=abort, 03:35:37 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8848}}}}}}}}}, 0x0) 03:35:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x1000000000000}) [ 1008.535375][T16815] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x0000000000000005,data_err=abort, 03:35:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x18402, 0x0) ioctl$TCSBRK(r0, 0x5409, 0x8001) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) recvfrom$ax25(r0, &(0x7f0000000100)=""/89, 0x59, 0x40000000, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0xfffffffffffffffd, r1) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xfffffffffffffffa, 0x1, 0x80000001, 0x80000000, 0x0}, &(0x7f0000000240)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={r3, @in6={{0xa, 0x4e22, 0x6ee, @remote, 0x5}}, 0x0, 0x80000000, 0x401, 0xa0000000, 0x42}, 0x98) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000000)={0x8001, 0x2, 0x5, 0x9}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000340)={{0xfffffffffffffffe, 0x8000}, 'port0\x00', 0x0, 0x404, 0x6, 0xffff, 0x360, 0x7, 0x7a2, 0x0, 0x3, 0x81}) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="000d3f0019d4cfc9e07d6f9faaec4c52232a8bfffebbc0d1fee3f4027a616e6d7d7e612ee30664453622736a45887231d2c9dc09185d4cd364aa9c3ba1970f529052fff28d92b9e896697b384171d253acb4f9b5f04edffbc5ff789db30d7ba1f61c3a242768b57e83deb98fb2b6387707178e08535a9a3d4fb618471fc04198803012be75bc2e4fb0cebf0182a8df4f"]) 03:35:37 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x2200, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f00000000c0)={0x8, 0x8001}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0, 0x100}], 0x2, 0x0, 0x0, 0x0) 03:35:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6}}, {@data_err_abort='data_err=abort'}]}) 03:35:37 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8864}}}}}}}}}, 0x0) 03:35:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="000d0000000000b7f330c605ba169185843514962d1094064a057c140d063b802c38f994be336887ad4aa8fdfe97f7000065897ee730e8082fe4809f257967958705699c83c4afa18dc2635244be0711a3bf67ce3e07c6b4edf58d5997a6d316f2e74373bbfd0c468868b613e860a7e16ab80390686275201f701b1233b31c487d8c97b588efa44349101600000000000000000000000000000000"]) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f0000000040)={0x0, 0x7fffffff, 0x2, 0x9c, &(0x7f00000000c0)=""/156, 0x95, &(0x7f0000000240)=""/149, 0x93, &(0x7f0000000300)=""/147}) 03:35:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xd000000000000}) 03:35:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x40000000, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$tun(r1, &(0x7f0000000180)={@void, @void, @mpls={[{0x5, 0x5, 0x4, 0x7fffffff}, {0x8, 0x4, 0x7f, 0x5}, {0x7f, 0x40, 0x71ae, 0x80}, {0x4, 0x8, 0xc9b, 0x101}, {0x6, 0x7, 0x0, 0x200}], @ipv4={{0x8, 0x4, 0x28, 0x7, 0x8f, 0x67, 0x8, 0x3, 0x8, 0x0, @empty, @empty, {[@timestamp={0x44, 0xc, 0xfffffffffffffffc, 0x1, 0x4, [{[@rand_addr=0x7b], 0x7}]}]}}, @dccp={{0x4e20, 0x4e22, 0x4, 0x1, 0x2a5, 0x0, 0x0, 0x5, 0x7, "ce564c", 0x4, "64e7a1"}, "3c8a9f9e370797cbc5f92a904a5ba6c7086031ea70a8fa6316597467ed6c53b5c5039b8f1a5fd37fcb115f1ffa0afe4730e581dbae83db4aadda77e37fa8f4c707654bea32c3fa51267da59697f94a896427db7699e73ae8eb3072ad25e27b"}}}}, 0xa3) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2, 0x1f5}}, 0x10) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00}) 03:35:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x10000000000000}) 03:35:38 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8906}}}}}}}}}, 0x0) [ 1009.424345][T16840] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x0000000000000006,data_err=abort, 03:35:38 executing program 4: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='hfsplus\x00', 0x0, 0x0) 03:35:38 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xf000}}}}}}}}}, 0x0) 03:35:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x20000000000000}) [ 1009.604436][ T2489] block nbd4: Attempted send on invalid socket [ 1009.611345][ T2489] print_req_error: I/O error, dev nbd4, sector 2 flags 800 [ 1009.619561][T16862] hfsplus: unable to find HFS+ superblock [ 1009.625692][T16858] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x0000000000000006,data_err=abort, 03:35:38 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xb) ppoll(&(0x7f0000000100)=[{r0, 0x8000}, {r0, 0x2}], 0x22f, 0x0, 0x0, 0x3b5) 03:35:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x48000000, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @default}, [@rose, @rose, @default, @bcast, @bcast, @rose, @rose, @null]}, 0x48) 03:35:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7}}, {@data_err_abort='data_err=abort'}]}) 03:35:38 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xf0ffff}}}}}}}}}, 0x0) 03:35:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x100000000000000}) 03:35:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x200000000000000}) 03:35:38 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1000000}}}}}}}}}, 0x0) [ 1010.301018][T16879] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x0000000000000007,data_err=abort, 03:35:39 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0xa0000, 0x0) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x5, 0x1) r2 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x3, 0x2) r3 = getpgrp(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000400)={0x0, @in={{0x2, 0x4e24, @loopback}}, 0x31f9, 0x0, 0x7fff, 0x10001, 0xffffffffffff8001}, &(0x7f00000004c0)=0x98) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000500)={r4, 0x8ff}, &(0x7f0000000540)=0x8) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f00000003c0)=r3) ioctl$VIDIOC_G_STD(r2, 0x80085617, &(0x7f00000001c0)=0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f0000000140)=r5) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$VIDIOC_REQBUFS(r6, 0xc0145608, &(0x7f0000000040)={0x1ff, 0x3, 0x4}) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r6, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x6c, r7, 0x314, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xf97}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x10000}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x100020000000}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100000000}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000}, 0x10) ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:35:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0xc0045878, 0x0) 03:35:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x400000000000000}) 03:35:39 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2000000}}}}}}}}}, 0x0) [ 1010.380322][T16891] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x0000000000000007,data_err=abort, 03:35:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x8}}, {@data_err_abort='data_err=abort'}]}) 03:35:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x900000000000000}) 03:35:39 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8000000}}}}}}}}}, 0x0) 03:35:39 executing program 4: move_pages(0xffffffffffffffff, 0x2b, 0x0, 0x0, 0x0, 0x0) 03:35:39 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8060000}}}}}}}}}, 0x0) 03:35:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xd00000000000000}) 03:35:39 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bind$bt_hci(r0, &(0x7f0000000180), 0xc) dup3(r1, r0, 0x0) [ 1010.663607][T16914] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x0000000000000008,data_err=abort, [ 1010.828091][T16931] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x0000000000000008,data_err=abort, 03:35:39 executing program 0: r0 = openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000040)) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000080)=0xb) r2 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000140)={{0x3, 0x2, 0x6, 0x8000, 'syz1\x00', 0x4}, 0x0, 0x30, 0x80, r2, 0x1, 0x3, 'syz1\x00', &(0x7f00000000c0)=['cgroup.type\x00'], 0xc, [], [0xd5b, 0x1, 0xffff, 0x101]}) ppoll(&(0x7f0000000100)=[{r1, 0x10}, {r1}], 0x2, 0x0, 0x0, 0x0) 03:35:39 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xd000000}}}}}}}}}, 0x0) 03:35:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x1b00000000000000}) 03:35:39 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x61) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) write(r0, &(0x7f0000001c80)="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", 0x5b5) 03:35:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x68000000, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x9}}, {@data_err_abort='data_err=abort'}]}) 03:35:40 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x20000000}}}}}}}}}, 0x0) 03:35:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x200000000000000}) 03:35:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x1d00000000000000}) [ 1011.424578][T16942] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x0000000000000009,data_err=abort, 03:35:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x1b00000000000000}) 03:35:40 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x28000000}}}}}}}}}, 0x0) 03:35:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x3700000000000000}) 03:35:40 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:35:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x100000000000000}) 03:35:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa}}, {@data_err_abort='data_err=abort'}]}) 03:35:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:40 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x30000000}}}}}}}}}, 0x0) 03:35:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x3f00000000000000}) 03:35:40 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3f000000}}}}}}}}}, 0x0) 03:35:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x20000000000000}) 03:35:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x4000000000000000}) [ 1012.319301][T16983] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x000000000000000a,data_err=abort, 03:35:41 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x43050000}}}}}}}}}, 0x0) 03:35:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x3f00000000000000}) 03:35:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x74000000, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r1, 0x10}, {r1}], 0x2, 0x0, 0x0, 0x0) r2 = dup3(r0, r1, 0x80000) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000000)={0x5, 0x2, 0x6, 0x8, 0x40, 0x8000}) 03:35:41 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x48000000}}}}}}}}}, 0x0) 03:35:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x6614000000000000}) 03:35:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x10}}, {@data_err_abort='data_err=abort'}]}) 03:35:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xffffffb8}) 03:35:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:41 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x60000000}}}}}}}}}, 0x0) 03:35:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x900}) 03:35:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xa400000000000000}) [ 1013.298695][T17016] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x0000000000000010,data_err=abort, 03:35:42 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x800e0000}}}}}}}}}, 0x0) 03:35:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x1d}) 03:35:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xa5ffffff00000000}) 03:35:42 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xc7, 0x400100) connect$bt_sco(r1, &(0x7f0000000080)={0x1f, {0x6, 0x8, 0x3f, 0x3, 0x68}}, 0x8) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000040)=0xb) ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:35:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2b}}, {@data_err_abort='data_err=abort'}]}) 03:35:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x10}) 03:35:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xb8ffffff00000000}) 03:35:42 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x80350000}}}}}}}}}, 0x0) 03:35:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x4}) 03:35:42 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x81000000}}}}}}}}}, 0x0) 03:35:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xc800002000000000}) [ 1014.237143][T17050] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x000000000000002b,data_err=abort, 03:35:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd02}) 03:35:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xfbffffff00000000}) 03:35:43 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x86ddffff}}}}}}}}}, 0x0) 03:35:43 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0}], 0x2, 0x0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x204000, 0x0) 03:35:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2d}}, {@data_err_abort='data_err=abort'}]}) 03:35:43 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x88470000}}}}}}}}}, 0x0) 03:35:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2b}}, {@data_err_abort='data_err=abort'}]}) 03:35:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xfdfdffff00000000}) 03:35:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x2}) 03:35:43 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x88480000}}}}}}}}}, 0x0) [ 1015.235194][T17089] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x000000000000002d,data_err=abort, [ 1015.263311][T17084] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x000000000000002b,data_err=abort, 03:35:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x4}) 03:35:44 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x88640000}}}}}}}}}, 0x0) 03:35:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x2}) 03:35:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) [ 1015.475411][T17104] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x000000000000002d,data_err=abort, 03:35:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) write(r0, &(0x7f0000000300)="04b7d7604813c7754119f981343713e3b6c30c172d8fdf63302b0e6fe061d9e29147c492cb3426c88fbf30d1833ae34a07d60aa7de4fdc3866380eb02361a6c4df9396236a5b5729909b3fb191e8275cba8f8eb5c191b895b80cd4e1b23040d35136e52b94a46cc6ae337e2ba51a671461cfff965600ef56ce541ebdd11b76eb405390c8ac58d48c4510e5082e123af1e8ebc7440534e9ef0faedb825d5080030c088859ad1d37f49d0c3a3e4fea60352fa988ddfc43e92ccf795f", 0xbb) r1 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f00000000c0)=0x9) ppoll(&(0x7f0000000100)=[{r1, 0x10}, {r1}], 0x2, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffff9c, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) r3 = fcntl$dupfd(r1, 0x0, r0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000003480)={0x0, @broadcast, @empty}, &(0x7f00000034c0)=0xc) ioctl$EVIOCGMTSLOTS(r3, 0x8040450a, &(0x7f0000000240)=""/87) sendmsg$nl_route(r3, &(0x7f0000003600)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8800}, 0xc, &(0x7f00000035c0)={&(0x7f0000003500)=@bridge_getneigh={0xb4, 0x1e, 0x430, 0x70bd2a, 0x25dfdbff, {0x7, 0x0, 0x0, r4, 0x10, 0x19010}, [@IFLA_NET_NS_FD={0x8, 0x1c, r3}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0xc8}, @IFLA_AF_SPEC={0x20, 0x1a, [{0x4, 0x7}, {0x4, 0x2}, {0x4, 0x1f}, {0x4}, {0x4, 0x1c}, {0x4, 0x7}, {0x4, 0x1e}]}, @IFLA_OPERSTATE={0x8, 0x10, 0x32}, @IFLA_IFALIAS={0x14, 0x14, 'lapb0\x00'}, @IFLA_LINKINFO={0x48, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x3c, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @remote}, @IFLA_VTI_REMOTE={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x7fffffff}, @IFLA_VTI_IKEY={0x8}, @IFLA_VTI_IKEY={0x8, 0x2, 0xfffffffffffffbff}, @IFLA_VTI_FWMARK={0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0xe}}]}}}]}, 0xb4}, 0x1, 0x0, 0x0, 0x8000}, 0x8005) ioctl$TIOCGWINSZ(r3, 0x5413, &(0x7f00000001c0)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r2, 0x9, 0x18}, 0xc) getsockopt$sock_int(r3, 0x1, 0x10, &(0x7f00000002c0), &(0x7f0000000080)=0x4) 03:35:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x9}) 03:35:44 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x88a8ffff}}}}}}}}}, 0x0) 03:35:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3b}}, {@data_err_abort='data_err=abort'}]}) 03:35:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0xfdfdffff00000000}) 03:35:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xfcfdffff, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227c, &(0x7f00000000c0)={0xd00}) 03:35:44 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x88caffff}}}}}}}}}, 0x0) 03:35:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xd}) [ 1016.156165][T17124] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x000000000000003b,data_err=abort, 03:35:44 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x89060000}}}}}}}}}, 0x0) 03:35:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227b, &(0x7f00000000c0)={0xd00}) 03:35:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x48}}, {@data_err_abort='data_err=abort'}]}) [ 1016.451204][T17149] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x0000000000000048,data_err=abort, [ 1016.514941][T17151] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x0000000000000048,data_err=abort, 03:35:45 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x3, 0xfffffffffffffffe) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) 03:35:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x10}) 03:35:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227b, &(0x7f00000000c0)={0xd00}) 03:35:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xfdfdffff, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:45 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xffffa888}}}}}}}}}, 0x0) 03:35:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x4c}}, {@data_err_abort='data_err=abort'}]}) 03:35:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227b, &(0x7f00000000c0)={0xd00}) 03:35:45 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xffffca88}}}}}}}}}, 0x0) 03:35:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x1b}) [ 1017.136126][T17162] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x000000000000004c,data_err=abort, 03:35:45 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = open(&(0x7f0000000000)='./file0\x00', 0x100, 0x40) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f0000000140)) r1 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) userfaultfd(0x800) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r1, 0x10}, {r1}], 0x2, 0x0, 0x0, 0x0) 03:35:45 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xffffdd86}}}}}}}}}, 0x0) 03:35:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x227b, &(0x7f00000000c0)={0xd00}) 03:35:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x1d}) [ 1017.291660][T17177] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x000000000000004c,data_err=abort, 03:35:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xfffffdfc, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x227b, &(0x7f00000000c0)={0xd00}) 03:35:46 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffff000}}}}}}}}}, 0x0) 03:35:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x60}}, {@data_err_abort='data_err=abort'}]}) 03:35:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x37}) 03:35:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x227b, &(0x7f00000000c0)={0xd00}) 03:35:46 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xf0ffffffffffff}}}}}}}}}, 0x0) 03:35:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xa4}) [ 1017.577866][T17203] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x0000000000000060,data_err=abort, [ 1017.746999][T17213] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x0000000000000060,data_err=abort, 03:35:46 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) ftruncate(r0, 0xa7) r1 = msgget(0x0, 0x0) msgrcv(r1, &(0x7f0000000000)={0x0, ""/46}, 0x36, 0x1, 0x1800) ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:35:46 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227b, &(0x7f00000000c0)={0xd00}) 03:35:46 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x100000000000000}}}}}}}}}, 0x0) 03:35:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x900}) 03:35:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@data_err_abort='data_err=abort'}]}) 03:35:46 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x200000000000000}}}}}}}}}, 0x0) 03:35:46 executing program 4: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227b, &(0x7f00000000c0)={0xd00}) 03:35:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xd00}) [ 1018.303678][T17224] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x0000000000000068,data_err=abort, 03:35:47 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x800000000000000}}}}}}}}}, 0x0) 03:35:47 executing program 4: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227b, &(0x7f00000000c0)={0xd00}) 03:35:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x1466}) [ 1018.428278][T17242] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x0000000000000068,data_err=abort, 03:35:47 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x800000000000000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0x200000030f) pause() ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:35:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:47 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x806000000000000}}}}}}}}}, 0x0) 03:35:47 executing program 4: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227b, &(0x7f00000000c0)={0xd00}) 03:35:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x1b00}) 03:35:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6c}}, {@data_err_abort='data_err=abort'}]}) 03:35:47 executing program 4: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x227b, &(0x7f00000000c0)={0xd00}) 03:35:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x1d00}) 03:35:47 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xd00000000000000}}}}}}}}}, 0x0) 03:35:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x2000}) 03:35:48 executing program 4: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x227b, &(0x7f00000000c0)={0xd00}) 03:35:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x74}}, {@data_err_abort='data_err=abort'}]}) 03:35:48 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) socketpair(0x2, 0x5, 0xd16, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000040)=0x2, 0x4) r1 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r1, 0x10}, {r1}], 0x2, 0x0, 0x0, 0x0) 03:35:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:48 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2000000000000000}}}}}}}}}, 0x0) 03:35:48 executing program 4: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x227b, &(0x7f00000000c0)={0xd00}) 03:35:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x3700}) 03:35:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7a}}, {@data_err_abort='data_err=abort'}]}) 03:35:48 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2800000000000000}}}}}}}}}, 0x0) 03:35:48 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227b, 0x0) 03:35:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x3f00}) 03:35:48 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227b, 0x0) 03:35:48 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3000000000000000}}}}}}}}}, 0x0) 03:35:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x4000}) 03:35:49 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000040)=0xb) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x181000, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) mq_timedsend(r1, &(0x7f0000000080)="2e3f351be043c7ecd73970a371e22643a4faa907123c498873112201449cf711df06f375998bdddecb77ed1222340553b358c8b6b92fd97e1711e634d5f6b0ce0303975db230ab73ae5eed2e1afb0cbd4d5f0739b8c80b241f44290697e78d13d257e9de911763df23520b66b16d3d3b295f4ffa1aca8529ece3", 0x7a, 0x800, &(0x7f0000000180)={r2, r3+30000000}) ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0}], 0x2, 0x0, 0x0, 0x0) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) write$P9_RREADLINK(r1, &(0x7f00000001c0)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) 03:35:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xc0}}, {@data_err_abort='data_err=abort'}]}) 03:35:49 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3f00000000000000}}}}}}}}}, 0x0) 03:35:49 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227b, 0x0) 03:35:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x6614}) 03:35:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:49 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4305000000000000}}}}}}}}}, 0x0) 03:35:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x4000}) 03:35:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xa400}) 03:35:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x6614}) [ 1021.113663][T17340] EXT4-fs: 6 callbacks suppressed [ 1021.113679][T17340] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x00000000000000c0,data_err=abort, 03:35:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xd0000}) 03:35:49 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4800000000000000}}}}}}}}}, 0x0) [ 1021.268739][T17355] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x00000000000000c0,data_err=abort, 03:35:50 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0}], 0x2, 0x0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x20000, 0x0) getsockopt$nfc_llcp(r1, 0x118, 0x3, &(0x7f0000000140)=""/230, 0xe6) 03:35:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xa400}) 03:35:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x100000}) 03:35:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}, {@data_err_abort='data_err=abort'}]}) 03:35:50 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6000000000000000}}}}}}}}}, 0x0) 03:35:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x200000}) 03:35:50 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x800e000000000000}}}}}}}}}, 0x0) 03:35:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0xa400}) [ 1022.132399][T17372] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x0000000000000300,data_err=abort, 03:35:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x3700}) 03:35:50 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8035000000000000}}}}}}}}}, 0x0) 03:35:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x1000000}) [ 1022.268525][T17391] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x0000000000000300,data_err=abort, 03:35:51 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x3314, 0x40080) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0xb) ppoll(&(0x7f0000000100)=[{r0, 0x10}, {r0}], 0x2, 0x0, 0x0, 0x0) 03:35:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x40000000000000, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier', 0x3d, 0x8cffffff}}]}) 03:35:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000240)={[{@barrier_val={'barrier'}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x500}}, {@data_err_abort='data_err=abort'}]}) 03:35:51 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8100000000000000}}}}}}}}}, 0x0) 03:35:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x200000}) 03:35:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x2000000}) [ 1022.975639][T17403] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000,debug_want_extra_isize=0x0000000000000500,data_err=abort, [ 1023.022930][ T7512] ================================================================== [ 1023.031475][ T7512] BUG: KASAN: use-after-free in __ext4_expand_extra_isize+0x16c/0x240 [ 1023.039634][ T7512] Write of size 512 at addr ffff888071d57f80 by task syz-executor.1/7512 [ 1023.048042][ T7512] [ 1023.050378][ T7512] CPU: 1 PID: 7512 Comm: syz-executor.1 Not tainted 5.0.0-rc8-next-20190301 #1 [ 1023.059301][ T7512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1023.069354][ T7512] Call Trace: 03:35:51 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@remote, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "254f84", 0x20, 0x11, 0x0, @ipv4={[], [], @loopback}, @remote, {[], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x86ddffff00000000}}}}}}}}}, 0x0) 03:35:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x1000000}) 03:35:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0xd00, 0x0, 0x4000000}) [ 1023.072654][ T7512] dump_stack+0x172/0x1f0 [ 1023.077001][ T7512] ? __ext4_expand_extra_isize+0x16c/0x240 [ 1023.082807][ T7512] print_address_description.cold+0x7c/0x20d [ 1023.088786][ T7512] ? __ext4_expand_extra_isize+0x16c/0x240 [ 1023.094597][ T7512] ? __ext4_expand_extra_isize+0x16c/0x240 [ 1023.100405][ T7512] kasan_report.cold+0x1b/0x40 [ 1023.105173][ T7512] ? __ext4_expand_extra_isize+0x16c/0x240 [ 1023.111006][ T7512] check_memory_region+0x123/0x190 [ 1023.116135][ T7512] memset+0x24/0x40 [ 1023.119950][ T7512] __ext4_expand_extra_isize+0x16c/0x240 [ 1023.125781][ T7512] ext4_mark_inode_dirty+0x6e9/0x940 [ 1023.131071][ T7512] ? ext4_expand_extra_isize+0x550/0x550 [ 1023.136717][ T7512] ? timespec64_trunc+0x180/0x180 [ 1023.141745][ T7512] ? kasan_check_write+0x14/0x20 [ 1023.146706][ T7512] ext4_unlink+0xd2d/0x1000 [ 1023.151213][ T7512] ? ext4_rmdir+0xc90/0xc90 [ 1023.155729][ T7512] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1023.161982][ T7512] vfs_unlink+0x2d8/0x560 [ 1023.166316][ T7512] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1023.172558][ T7512] do_unlinkat+0x3f7/0x6d0 [ 1023.176980][ T7512] ? __ia32_sys_rmdir+0x40/0x40 [ 1023.181838][ T7512] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1023.188089][ T7512] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1023.194355][ T7512] ? getname_flags+0x277/0x5b0 [ 1023.199122][ T7512] __x64_sys_unlink+0x42/0x50 [ 1023.203805][ T7512] do_syscall_64+0x103/0x610 [ 1023.208399][ T7512] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1023.214287][ T7512] RIP: 0033:0x457b77 [ 1023.218182][ T7512] Code: 00 66 90 b8 58 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1023.237786][ T7512] RSP: 002b:00007ffe3d775ae8 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 1023.246195][ T7512] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457b77 [ 1023.254169][ T7512] RDX: 00007ffe3d775b00 RSI: 00007ffe3d775b00 RDI: 00007ffe3d775b90 [ 1023.262140][ T7512] RBP: 00000000000018ca R08: 0000000000000000 R09: 0000000000000011 [ 1023.270142][ T7512] R10: 000000000000000a R11: 0000000000000246 R12: 00007ffe3d776c20 [ 1023.278114][ T7512] R13: 000000000144d940 R14: 0000000000000000 R15: 0000000000000001 [ 1023.286097][ T7512] [ 1023.288420][ T7512] The buggy address belongs to the page: [ 1023.294082][ T7512] page:ffffea0001c755c0 count:2 mapcount:0 mapping:ffff8880a1142518 index:0x44f [ 1023.303110][ T7512] def_blk_aops [ 1023.303121][ T7512] flags: 0x1fffc000000203a(referenced|dirty|lru|active|private) [ 1023.314206][ T7512] raw: 01fffc000000203a ffffea0001db9b48 ffffea0001adbdc8 ffff8880a1142518 [ 1023.322806][ T7512] raw: 000000000000044f ffff88808dccad20 00000002ffffffff ffff8880587fa280 [ 1023.331401][ T7512] page dumped because: kasan: bad access detected [ 1023.337820][ T7512] page->mem_cgroup:ffff8880587fa280 [ 1023.343006][ T7512] [ 1023.345325][ T7512] Memory state around the buggy address: [ 1023.350950][ T7512] ffff888071d57f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1023.359021][ T7512] ffff888071d57f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1023.367080][ T7512] >ffff888071d58000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 1023.375138][ T7512] ^ [ 1023.379204][ T7512] ffff888071d58080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 1023.387261][ T7512] ffff888071d58100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 1023.395316][ T7512] ================================================================== [ 1023.403372][ T7512] Disabling lock debugging due to kernel taint [ 1023.413917][ T7512] Kernel panic - not syncing: panic_on_warn set ... [ 1023.420535][ T7512] CPU: 1 PID: 7512 Comm: syz-executor.1 Tainted: G B 5.0.0-rc8-next-20190301 #1 [ 1023.430846][ T7512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1023.440892][ T7512] Call Trace: [ 1023.444187][ T7512] dump_stack+0x172/0x1f0 [ 1023.448516][ T7512] panic+0x2cb/0x65c [ 1023.452409][ T7512] ? __warn_printk+0xf3/0xf3 [ 1023.457010][ T7512] ? __ext4_expand_extra_isize+0x16c/0x240 [ 1023.462812][ T7512] ? preempt_schedule+0x4b/0x60 [ 1023.467656][ T7512] ? ___preempt_schedule+0x16/0x18 [ 1023.472760][ T7512] ? trace_hardirqs_on+0x5e/0x230 [ 1023.477785][ T7512] ? __ext4_expand_extra_isize+0x16c/0x240 [ 1023.483586][ T7512] end_report+0x47/0x4f [ 1023.487736][ T7512] ? __ext4_expand_extra_isize+0x16c/0x240 [ 1023.493535][ T7512] kasan_report.cold+0xe/0x40 [ 1023.498211][ T7512] ? __ext4_expand_extra_isize+0x16c/0x240 [ 1023.504010][ T7512] check_memory_region+0x123/0x190 [ 1023.509118][ T7512] memset+0x24/0x40 [ 1023.512921][ T7512] __ext4_expand_extra_isize+0x16c/0x240 [ 1023.518554][ T7512] ext4_mark_inode_dirty+0x6e9/0x940 [ 1023.523841][ T7512] ? ext4_expand_extra_isize+0x550/0x550 [ 1023.529563][ T7512] ? timespec64_trunc+0x180/0x180 [ 1023.534610][ T7512] ? kasan_check_write+0x14/0x20 [ 1023.539544][ T7512] ext4_unlink+0xd2d/0x1000 [ 1023.544175][ T7512] ? ext4_rmdir+0xc90/0xc90 [ 1023.548677][ T7512] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1023.554918][ T7512] vfs_unlink+0x2d8/0x560 [ 1023.559247][ T7512] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1023.565485][ T7512] do_unlinkat+0x3f7/0x6d0 [ 1023.569897][ T7512] ? __ia32_sys_rmdir+0x40/0x40 [ 1023.574746][ T7512] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1023.580985][ T7512] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1023.587221][ T7512] ? getname_flags+0x277/0x5b0 [ 1023.591984][ T7512] __x64_sys_unlink+0x42/0x50 [ 1023.596682][ T7512] do_syscall_64+0x103/0x610 [ 1023.601268][ T7512] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1023.607151][ T7512] RIP: 0033:0x457b77 [ 1023.611042][ T7512] Code: 00 66 90 b8 58 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1023.630643][ T7512] RSP: 002b:00007ffe3d775ae8 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 1023.639052][ T7512] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457b77 [ 1023.647019][ T7512] RDX: 00007ffe3d775b00 RSI: 00007ffe3d775b00 RDI: 00007ffe3d775b90 [ 1023.654990][ T7512] RBP: 00000000000018ca R08: 0000000000000000 R09: 0000000000000011 [ 1023.662958][ T7512] R10: 000000000000000a R11: 0000000000000246 R12: 00007ffe3d776c20 [ 1023.671011][ T7512] R13: 000000000144d940 R14: 0000000000000000 R15: 0000000000000001 [ 1023.680238][ T7512] Kernel Offset: disabled [ 1023.684674][ T7512] Rebooting in 86400 seconds..