x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) connect$llc(r0, &(0x7f0000000040)={0x1a, 0x110, 0x5, 0x81, 0xf79, 0x10000}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) write$P9_RREAD(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="ea000000750100df000000c71dc408e57c680edc77c7982c5bb8d8a2cd7866d4566fa8a0f44a4c32998d3655d7cadb5fe849176bcf92adc43577667949c923eeaec8e8eacb19b7a319dbfb544dc36e1ee17157ef1e03056c06b142d5d61554bc00daf6dc28b46efde72053b4e78d841755e5888076f0c4c57c6b772e54949b3c467641a0bf19bf294cdbb15c4634660f6bcfbf3cfbe12c919c68e985e47e9079733e8c589e19673eeb730ba4c55dd414d5ac857ed2c11f40cc529583769ec9e398d99416ac4ca40a3d1e05de43b38cb0185c43adbc9841b56fb26b42bae03b055235c864257415cbe213"], 0x9b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000940)=@broute={'broute\x00', 0x20, 0x4, 0x678, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000100), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x13, 0x21, 0x8867, 'syz_tun\x00', 'team0\x00', 'ip_vti0\x00', 'ip_vti0\x00', @dev={[], 0x21}, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], @random="bfca74880464", [0x0, 0x0, 0xff, 0xff, 0x83e77265841e6443, 0xff], 0x128, 0x128, 0x1a0, [@ip6={'ip6\x00', 0x50, {{@mcast1, @ipv4={[], [], @remote}, [0x0, 0xffffffff, 0xff, 0xff000000], [0x0, 0xffffffff, 0xff, 0xff], 0x6034, 0xaf, 0x11, 0x6, 0x4e21, 0x4e21, 0x4e22, 0x4e22}}}, @statistic={'statistic\x00', 0x18, {{0x0, 0x1, 0xff, 0x1ff, 0x2, 0x3f}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0xffffffff, 0x243fe0e0, 0x2, 0x0, 0x0, "5f1ac07fda595c10cadb62b0db63b0fd1052b3b577e0e7f47aca3a9921587411a4fb7a7fdd0e125039e925899a1f59814a55f0e24e3cc3a03244f8aba6241cc5"}}}}, {{{0x3, 0x4, 0x6f5d, 'team0\x00', 'gretap0\x00', 'bridge0\x00', 'gretap0\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @dev={[], 0x20}, [0x0, 0xff, 0xff], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8, {{0x3}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x0, 0x60, 0x88af, 'ip6gre0\x00', '\x00', 'veth0_to_team\x00', 'bpq0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @dev={[], 0x1b}, [0xff, 0xff, 0xff, 0xff, 0xff], 0xe0, 0xe0, 0x110, [@realm={'realm\x00', 0x10, {{0x80, 0x2, 0x1}}}, @realm={'realm\x00', 0x10, {{0x4, 0x80000000, 0x1}}}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0xbe}}}}, {{{0x13, 0x50, 0x891d, 'team0\x00', 'irlan0\x00', 'ip6gretap0\x00', 'veth1_to_team\x00', @remote, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @random="3fab6c3fe6f1", [0x0, 0xff, 0xff, 0x0, 0xff], 0x1d8, 0x248, 0x298, [@comment={'comment\x00', 0x100}, @connbytes={'connbytes\x00', 0x18, {{0x5, 0x4000000000, 0x1, 0x3}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@empty, 0xfffffffffffffffd}}}, @common=@mark={'mark\x00', 0x10, {{0xffffffd0, 0xffffffffffffffff}}}]}, @common=@log={'log\x00', 0x28, {{0x5, "e479dfc3eb12b16438b4d43e0f1fa3b21a571f24ef46ec3809e778cb8d48", 0xd}}}}]}]}, 0x6f0) 13:01:16 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2d00, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:16 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x3f00, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:16 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) r2 = syz_open_pts(r1, 0x100) r3 = shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x5000) shmdt(r3) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) ioctl(r2, 0x1, &(0x7f0000000100)="069309b533941413400f36ad5ccb9507f5ffb2c59a38aaa76b6756ce61fa4ab29593acb8fb2a984fd09f3296c083fd900012a0dc5637bcaa495235a62f62fa92a7dd9559359aab590a9d95a6b2d8b260db0e9b855f89e7c55b600ab30625c24ddc6c5a13110a27725600e85a55077a") r4 = fcntl$getown(r2, 0x9) r5 = syz_open_procfs(r4, &(0x7f00000001c0)='net/ip_tables_names\x00') preadv(r5, &(0x7f0000000000)=[{&(0x7f0000000280)=""/168, 0xffffff7c}], 0xfffff68, 0x0) 13:01:16 executing program 3: r0 = socket(0xb, 0x0, 0x9) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x10a}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e22, @local}}, 0x10001, 0x100000001, 0x9, 0xbcb8, 0xc1}, 0x98) preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000023004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:17 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xc, 0x8080fffffffe) 13:01:17 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffff5, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:17 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0xe4ffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:17 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000003540)={0x0, 0x0, 0x2080}) ioctl$TIOCGSID(r0, 0x5429, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:17 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f00000002c0)=0x147) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000300)={0xc0000000, 0x7, "3bdeb45ed1cc391ff1e0b4fec13c905177fc0be6ad31c56457ac03c922845566", 0x2, 0x800, 0x80000000000000, 0x7f, 0xf94, 0x9af8, 0x3, 0x4, [0x400, 0x0, 0x1, 0x200]}) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000040)) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="020328bd7000fbdbdf250700000024000300080007004e21000008000800f700000008000400ff0100000800030000000000080006000000000048368739edca39d9074fe5e8ffb97e9d111e9f19ff3c3a7493d8e6ee91817cf32340dfc721383f3d3914d8b18654fef3775bb58bd452008ab3919f146e4840e0161f46c7257c2b3aa0e21b8c30a496c9fc391e7b35d7ad5a1b967a65e9074ea657f8a5a5e703e8040ce822c8277d5c8eb4d6023dbaac16"], 0x40}, 0x1, 0x0, 0x0, 0x4040000}, 0x20040011) ioctl$IOC_PR_CLEAR(r3, 0x401070cd, &(0x7f0000000280)={0x6}) r5 = request_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)='net/ip_tables_names\x00', 0xfffffffffffffff9) socket$inet6_udp(0xa, 0x2, 0x0) r6 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r5, r6) 13:01:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000100000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:17 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x400000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) [ 480.175069] EXT4-fs: 8 callbacks suppressed [ 480.175082] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 13:01:17 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') sendto$llc(r0, &(0x7f0000000200)="4e7cf192c61c99be0849efbfb927228b0f971147acf40421b31446feb3802b6880566ba422a9f9e15ee05c93d02535f5d95f3eba9e96ea3238643b9d35f7ad13100c72f2184bc741a8a7ca12fe269948553f56db36cc2863465b5dba5201d4d54d6c3c0c691f73f85af740cd8958ba782342fc882f72f3d309dd3f19a2fd0ce002b00ec1e7836427a26badd1e2fa83abc8d9df352d24d687583b1fb64ddc054fc3d6fdcbe0a2b724db8375edd9312309c2a51eaf9b194b0ebb751489986f0fc1cb221325f9cb6b8bd6133a959b1bffd1c32e4c8c88e8d1", 0xd7, 0x4, &(0x7f0000000300)={0x1a, 0x31f, 0x800, 0x1, 0x8, 0x15, @remote}, 0x10) preadv(r0, &(0x7f0000000640)=[{&(0x7f0000000340)=""/220, 0x53}, {&(0x7f0000000440)=""/41, 0x29}, {&(0x7f0000000480)=""/144, 0x90}, {&(0x7f0000000540)=""/110, 0x6e}, {&(0x7f00000005c0)=""/75, 0xfffffffffffffda7}], 0x2d8, 0x0) io_setup(0x2, &(0x7f0000000000)=0x0) io_cancel(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7, 0x6, r0, &(0x7f0000000100)="6ab78ba074fe4bd9f2e43271f1c083d67124b7adcea2de11c6de404b18c25f87ef07292b0fc86af8177f880a4996d2e99edf55d3720330b77b78acd4973d7f7e9d5b178f4e47dd3df207da166a3427dd10741e393502382a305c21", 0x5b, 0x7, 0x0, 0x1, r0}, &(0x7f00000001c0)) 13:01:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000f6ffffff00000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:17 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:17 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x1200, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:17 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x1f}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={r1, 0x5}, &(0x7f0000000140)=0x8) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 480.495141] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 13:01:18 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x3f00, 0x8080fffffffe) 13:01:18 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xc0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400, 0x0) 13:01:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000edc000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:18 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0xffffffff00000000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:18 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x12f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCGSID(r0, 0x5429, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0xf0c743cdd98a0e53) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x200) 13:01:18 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4000, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:18 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0xff0f000000000000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) [ 481.177024] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 13:01:18 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x80000, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x0, 0xffffffffffffff13) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:18 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xa000000, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000fcfdffff00000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:18 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x800000000000000, 0x8080fffffffe) 13:01:18 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x2000000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:18 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x10000, 0x675012fbd538cefa) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000002c0)={@empty, 0x0}, &(0x7f0000000300)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'syzkaller1\x00', 0x0}) getpeername(0xffffffffffffff9c, &(0x7f0000000400)=@can={0x1d, 0x0}, &(0x7f0000000480)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000580)=0x14) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000940)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x11000000}, 0xc, &(0x7f0000000900)={&(0x7f00000005c0)={0x334, r1, 0x500, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0xbc, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x6f1d99ed}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}]}}, {{0x8, 0x1, r4}, {0x80, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3f}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0x1cc, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7f}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xc8b}}, {0x8}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0x101, 0x9, 0x4c, 0x29f0}, {0x0, 0x3, 0x6e0a}, {0xff, 0x4, 0x401, 0xfffffffffffffffe}, {0x6, 0x5, 0x1, 0x8001}, {0x8, 0x2, 0x8, 0x5}, {0xfff, 0x1000, 0x3, 0x2}]}}}]}}]}, 0x334}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r9, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:18 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x4000000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:18 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x10000000, 0x8080fffffffe) 13:01:18 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') sendto$packet(r0, &(0x7f00000001c0)="d14f268e863fe5c73f40ff1aa4877b5091e8863bf9023e95506a599914e8bdd67b92afc305fe6aa53f9736f5fca36de64fd035a8fafd9a8aa42aef4f2cf45d14956c12eb8d848c82ce3ad74a30d39e075bc6baff1d409995e81d5916e4ff973faabea7f8936a688bbb7972a8cac83c88641e399e9fabc48f296fbed61cb20e42191ccdb89d54d023c2532d5925148a49aa318cc0fd5bb556c5340774be81e91aa07374059dc27a6e1781f18e5bf309520d050f421dd75fbe6809f0c05a5fd7bf5897", 0xc2, 0x20000040, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000001004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) [ 481.493507] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 13:01:18 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x6, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:18 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x19, 0x5, 0x5, &(0x7f0000000040)={0xffffffffffffffff}) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:18 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0xffffffe4, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:18 executing program 3: socket$rds(0x15, 0x5, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000000000007a004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:18 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x809000000000000, 0x8080fffffffe) [ 481.734989] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 13:01:18 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000140)=@req={0x28, &(0x7f0000000000)={'ip6gretap0\x00', @ifru_addrs=@ax25={0x3, {"fb0f0b7201ee0b"}, 0x7}}}) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000200)=0x42) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000080)={0x0, 0xfff, 0x7f, 0x3}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r2, 0x101, 0xcbc, 0x10000, 0x1, 0xa7e}, &(0x7f0000000180)=0x14) 13:01:18 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f0000000000)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) 13:01:18 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x8bffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:18 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4000000000000, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:18 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000040)={@mcast2, r1}, 0x14) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x40) 13:01:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000004000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:19 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xfffffffffffffff0, 0x8080fffffffe) 13:01:19 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0xc, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:19 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$TIOCGSID(r0, 0x5429, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:19 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x6000000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) [ 482.021540] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 13:01:19 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x3000000, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000fff000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:19 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x300000000000000, 0x8080fffffffe) 13:01:19 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x3ffffffffffff98, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) r1 = getpgrp(0x0) process_vm_writev(r1, &(0x7f0000000140)=[{&(0x7f0000000000)=""/76, 0x4c}, {&(0x7f00000001c0)=""/133, 0x85}, {&(0x7f0000000100)=""/39, 0x27}], 0x3, &(0x7f0000000740)=[{&(0x7f0000000280)=""/118, 0x76}, {&(0x7f0000000300)=""/125, 0x7d}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/162, 0xa2}, {&(0x7f00000004c0)=""/131, 0x83}, {&(0x7f0000000580)=""/111, 0x6f}, {&(0x7f0000000600)=""/145, 0x91}, {&(0x7f00000006c0)=""/95, 0x5f}], 0x8, 0x0) 13:01:19 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') socket$unix(0x1, 0x2, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000000)={0x1, 0x1, 0xf8, 0x8, 0x6}) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:19 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0xd, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:19 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000100)={0x7, 0x5, 0x8, 0x13, 0x6, 0x2c, 0x3, 0x100, 0x3, 0x0, 0x80000001, 0x800}) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000040)={0x0, @dev={0xac, 0x14, 0x14, 0x17}, 0x4e21, 0x1, 'ovf\x00', 0x11, 0x81}, 0x2c) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400, 0x0) [ 482.252793] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 13:01:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00007400000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:19 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x100000000000000, 0x8080fffffffe) 13:01:19 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x20000000000000, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:19 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0xd00000000000000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) [ 482.368378] IPVS: set_ctl: invalid protocol: 0 172.20.20.23:20001 [ 482.407506] IPVS: set_ctl: invalid protocol: 0 172.20.20.23:20001 13:01:19 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x800, 0x0) connect$pptp(r0, &(0x7f0000000100)={0x18, 0x2, {0x5, @rand_addr=0x576}}, 0x113) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:19 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x101080, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000040)=""/43) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:19 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x700000000000000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000009004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:19 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0xffffffffffffffa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x4) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f00000001c0)={0x0, 0xad, "4f16bf69f166c698cc67f53cd56bcf6dca6e92081357171cd150c971d503847ddd2964bd8c55fbc30ee162e1a6bf8255d876c75376faae458ed9b3d781b0b1a38d1190f380e8a9618c81107a486a8f2777f4737bc3a1c99f1ed5a4b500156e9f4b173847114a0b16da9d580e1e04d372c69cb0cbe87edda887feada034e51840e25b6faf69c3b5fc9411fe470e71f670d152dd6b02922c205a782a8c156d4291c88ba3323ae9abe3fb959be035"}, &(0x7f0000000040)=0xb5) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000100)={r1, 0x9f, 0x2}, &(0x7f0000000140)=0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 482.612102] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 13:01:19 executing program 3: ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f00000004c0)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="e19f0195af59b7598f3707ddfe3035b6aa2c6c95ab483c1e5ea5360ec4c3ea81685cde366c15b9e72676f4f93818ec9f12714f1e8b8644767799457470629b9d11714d1e87825fd9a0fe19e5acc296309f4e6f4592f9a69a492052aa39a32a954e15dcd8fbad7e6410462a487410f0f8f79a87e8f146e554bad25c0cec5634b6f72ae6a1b388d89575cc3d4d657964a5"]]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, &(0x7f0000000140)=""/83, 0x53, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00'}, &(0x7f00000001c0)}) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000600)='./file0\x00', 0x8641, 0x12) setsockopt$llc_int(r3, 0x10c, 0x4, &(0x7f0000000640)=0x1, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r4, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:19 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xf00000000000000, 0x8080fffffffe) 13:01:19 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:19 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x80000000000000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:19 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000100)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000140)={0x7, 0xace1, 0x4, 0x4, 0x7fffffff}, 0x14) 13:01:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000400004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:19 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x1200000000000000, 0x8080fffffffe) 13:01:19 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001280)={&(0x7f00000011c0)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000002780)=[{&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/252, 0xfc}, {&(0x7f0000002440)=""/239, 0xef}, {&(0x7f00000025c0)=""/139, 0x8b}, {&(0x7f0000001240)=""/60, 0x3c}, {&(0x7f0000002680)=""/240, 0xf0}], 0x6, &(0x7f0000002800)=""/105, 0x69, 0x3}, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) r2 = add_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000001c0)="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", 0x1000, 0xfffffffffffffffd) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f00000028c0)={0xa10004, 0x6, 0x9, [], &(0x7f0000002880)={0xbb097e, 0x200, [], @p_u32=&(0x7f0000002540)=0xfffffffffffff001}}) keyctl$assume_authority(0x10, r2) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000100)) 13:01:19 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0xf6ffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) [ 482.857536] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 13:01:20 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_mr_vif\x00') write$P9_RREADDIR(r0, &(0x7f00000001c0)={0xa6, 0x29, 0x1, {0x2, [{{0x2, 0x4, 0x1}, 0x5, 0xffffffffffffff6e, 0x7, './file0'}, {{0x10, 0x0, 0x7}, 0x200, 0x2, 0x7, './file0'}, {{0x10, 0x2, 0x2}, 0x1, 0x7d4b, 0x7, './file0'}, {{0xcb, 0x0, 0x8}, 0x4, 0x4, 0x7, './file0'}, {{0x40, 0x1, 0x2}, 0x1, 0x6, 0x7, './file0'}]}}, 0xa6) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000400000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:20 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:20 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r0, &(0x7f00000001c0), 0x62e, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000100)=@sha1={0x1, "c49f2fed6e5fee5f707e24a62f192cb02d530dd6"}, 0x15, 0x1) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000000)) 13:01:20 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x1000000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:20 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x8000000000000000, 0x8080fffffffe) 13:01:20 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) io_submit(0x0, 0x1, &(0x7f0000002100)=[&(0x7f0000000f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000001080)="912848d734353fb837d8d72ffc9d6f8fe671daac683f56b4b45dd3944ae189987456704538fd9559841de3b8a13453ad148623f4b278b8", 0x37}]) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f00000010c0)='/dev/input/mouse#\x00', 0x4, 0x200) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000001100)={0x0, @in={{0x2, 0x4e20, @multicast1}}, 0x1f, 0x4, 0x2, 0x1, 0x9}, &(0x7f00000011c0)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000001200)={r3, 0x200}, &(0x7f0000001240)=0x8) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @remote}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) setsockopt$inet_int(r1, 0x0, 0x40, &(0x7f0000000ffc), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) r4 = syz_open_procfs(r0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r4, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:20 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000040)) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000100)={0x8000000, 0x6, 0x3}) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/196) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00006c00000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) [ 483.154980] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 13:01:20 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x8580200, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:20 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x5000000, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:20 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0xffffffffffffffa2, 0x12800) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f00000001c0)=0x1, 0x2) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x9f09bda3bb6ee6d9, 0x0) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000100)) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000000)) 13:01:20 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x5000000, 0x8080fffffffe) 13:01:20 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000427, 0x0) 13:01:20 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0xc00, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000e82004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:20 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0x11}, 0x5}}, 0x3, 0x8, 0x10001, "262007d032a6fee41473baf40324b519adfedf5b81a1779ac3e359475c82a2f6cee91436f0cfa8054029eb7cccebaa5e1a5b6ba736ef217cc06a7040e29968d0a5d3b91e847394c77646090f6136ec9f"}, 0xd8) 13:01:20 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xf8f73f00, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:20 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x8a00, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000040)={0x5}) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1, 0x0, 0x0, 0xfffffffffffffffc}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000400)=ANY=[@ANYBLOB="00000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000090000001a00000060020000000000002000000000000000ef580000000000000900000000000000000000000000000000000000000000000000000000000000ff03000001010000080000000000000004000000000000000800000000000000000050b4def19f8c813000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffe00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007638b9"]) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000100)=0x2, 0x4) preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:20 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x700, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:20 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x40060000, 0x8080fffffffe) 13:01:20 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000100000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:20 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0xfffffff6, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:20 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/4, 0x4}, {&(0x7f00000001c0)=""/191, 0xbf}, {&(0x7f0000000040)=""/6, 0x6}, {&(0x7f0000000280)=""/140, 0x8c}], 0x4, 0x0) 13:01:20 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xa, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:20 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x3, 0x8080fffffffe) 13:01:20 executing program 5: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) r2 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f00000001c0)={0x0, 0x2b0b5929, 0x10001, 0x80000001, 0x3, 0x0, 0x3120}, 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r3 = fcntl$getown(r2, 0x9) r4 = syz_open_procfs(r3, &(0x7f0000000180)='net/ip_tables_names\x00') syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f0000000200), &(0x7f0000000280)=0x60) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000100), &(0x7f0000000140)=0x40) preadv(r4, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:20 executing program 3: madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x10000000000004) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000100)={0xfffffff, 0x4, 0x1f, [], &(0x7f0000000040)={0xbf097f, 0x1ff, [], @ptr=0xf141}}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e23, 0x80000001, @mcast2, 0xfffffffffffffffe}}, 0x8}, &(0x7f00000002c0)=0x90) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000300)={r3, @in6={{0xa, 0x4e20, 0x2, @empty, 0xfffffffffffffff7}}, 0x46c330d4, 0x1}, &(0x7f00000003c0)=0x90) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000001c0)={@empty, 0x5, r2}) preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000fffffff5004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:20 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0xe4ffffff00000000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:20 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='comm\x00') ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000100)={{0x3, 0x3, 0x80000001, 0x3, 0x3}, 0x5, 0x800, 0x2}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000000)={0x200, 0x101, 0xfffffffffffffff8, {0x0, 0x1c9c380}, 0x101, 0x1d4}) preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r1, 0x4008ae93, &(0x7f00000001c0)=0xf000) 13:01:21 executing program 5: socketpair(0x10, 0x6, 0x5, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r0, &(0x7f0000000200)=@abs, &(0x7f0000000280)=0x6e) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000000)=""/111) preadv(r1, &(0x7f0000000480), 0x0, 0x0) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 13:01:21 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x9, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000000)=""/103, &(0x7f0000000100)=0x67) 13:01:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000003004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:21 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x858020000000000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:21 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000480)='/dev/adsp#\x00', 0xc4, 0x0) ioctl$KVM_SET_NESTED_STATE(r1, 0x4080aebf, &(0x7f0000003540)={0x2, 0x0, 0x2080, {0x3, 0x100000, 0x3}, [], "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", "2c924277ec5717022ace04454e6ecad14e661927ea4751856356ccce516d4838c35d0aa2e9fe5240bd6c1dc3cddc0514c69456baaa5013750d1ea9d2eee9c5d9cfe24c33d4b97780a08a23baf19faf684adf231531cfac6e975b879f7fa6470d5ba1bede82925c72e0e11dc10a20529106d7e30a5aae8a6904954cb531c6394afede4c93f200363d3e0a22ef5a3b657980bf947e558197f92920dab582fff3dee68774307e47627326dbbd9356a6b48b87d7cb8e75247d17d6d25fa421d99ff8c365c67a74fe9e3816b13140535bf8f2cf5dc57e8ba133fb539292b538b312213791582fea049eb841a81e659040424ccfa57140714900c05ae6a48d80b81ad82df1ac345a658b7fb58c92354c9633fd1867f86eacfc6b18f0621470bd0287b5e7311fb6ab2d138bfc59df5b1d8a50c0b1d9fb1bd77844fe214842a20d43e4f2a791928f9481d5bfdc1532d69771dd4fa6f373c39f586915c54fad50694f2dcefff2ec79177acaa2850f668d061834c1c09760030dc2eec1cf8077db9177f73699e33ea7db1af60522e32372c851c6ef2eb829b320e38d2bb86b7546c425dcb5a86518e84a9d7248316c5fdf06bbe71ff5200e3755aa5b0c6a47f2da1627c392ef8b5ca68049b85eda490738813c1b2ea2f9e6bdbbd9a58358d33eae6c3b56bd42c0c2b411a9731ade9c02968502ac7f9ed1bf68df322d6ed7811fa9d9ce2d602e8c9014e46d7ba2c7d91dc6a95a47a58cc12fb835cdd14fce458b622323bbcc8efdf5eeb75bc126747731c96c71a90c6b0b7927bd33e7f75682f015e9f8cc07c6f10e8901be678f6cad2f1fd4fbf0e038218d7ab9a1818754c98c77b3b9cb09e1e86b601bb65b94e4ca95fbbf34207b351819d6c069ff2df852deb8fa4f51f81fcb3949026003ab2eed4445b7978bbdcbf09ee9f7ee900324ccb5125c8d2a95d17bebfe6c97642db5dc2567e6748e2794cc7b49b8f60c0aa3b80bde854ec842c0b3fe90cab11d3bee8709fcfa68b8c969d395b6540bb3bdf326fe38ffbb871a0cef8dd9bdf216e48d7bc399e9d1b5d77cd63f1735a8a39c3ab852859679e1930613013db042a65349951576508d5ab438fa1a063862855275267d3f9f49520a0a533ca3b6d306e8010086debd1b158a2a547b8190ea5715b9062d697d7f92e09dc43b632c5cec289f75e880562b459cac37317fd2027fc176113bb0d7eed31ed2e456e8e044213713e7fed80ee6b6e471da56185c86cf4bf6f93a52fe46e908ad54cfc503d3f4fb87d8adfc424b0f02d11ae611c1465e24f4708f51889c8a324e5d7f326bcdad6c1856a24d8339dcd189453e8b56d6ad297d622c8eb714438d1a804592c4829991190a4612f7ba0f89d920b60c53b873ecbc66639b73f29f52aca87a71d14a10d6a01799c68ac5aab5d236a2adbc4b1dcf4f02c187bfc6865d3c95bf89b5a8f1d409999758407d98d6b3154a57e70c4e109b3c6f2c9d131f4a4094a09b4ff1c15f9b7d5fff7cbb77f504f010f87c5c565ebc40aef21a14d9574aec088d2a030435b1bb9cb26c29ff31b25c2c1a9659cac4aabf1fc14f838c73283c4b16ed4ea5479a94d7e40b1f9460df019c8bb5b294ef7c9f4921fbc9b345e166c90e731dad43c328c2a7c3a7525413267c8df9eacb4a7e77ee97f40f52d6f4e0a3e7d029d6cbd22490644c797dc254dcd838d4ec540235a5ce55064f43beb9f5a55941b16a91f3125eebc2d79078a6345705fbc3b092e3f8c2416148b32e54136ab86d5663a2d900ab1b32ffaf6a424b917260624e35a2552af554b55b7b31be340f452079d3ab746aa8fc4dee1b29b8df7780c1b2948c15781da609c0598ab2a5140904473d98a4396a9456dc891ed64bf4a603aeb5869ab65eba03d684e491c9ceea9240e4d97fda98c4cfeb552e8a043d36cda03fed0340332b4dbc0645b49add5d3cad145ac0356f4faa38c46d4343847972a01a6d18d3772d5e299eb41ba5535fbb9b96ef027e073d1153dd995ce859f8cb326649f0923f265688ef184e8aa8e9e5136abf66f844c339acfe0d265f76ea50ea4cdc0dd5685320984fa7abc4b97df52368ea347edc3cbd33b598100d01e010fd608a2e655c31ace03dcd76f95ad9f0bf376b91f4058c704b84483a252cffcb7b5813695234b7bd32fec8c17dfc3f0ece668c45a3ae2f3086e5c16f498ae5f24af635d70321bc3fdb089c6f4ba3f91a53cc9fd3276fd8b692997a40bff9cc7cf104a3fb40ac5c34a9893199471d3fb7da4fcc1f61402365b9a8ba873f851a08628fe69b07995e4a2d28ebed13b9e527a1aad9855c81b0c424701b8f0b82e9ab4c4851c9ecd3826ff478580dde93763ad23c97cc185033a5532e8fc51321afb51a57d69ef5981c16699ec9a1ea125dfd00e421e6a2fe6925883a4c45692002b4aabd29de2748c84fadd53b593d4dc48f9785e0b4f1e087e78177514337796b12e5a00733557aa5ef02141c611f811f8d53c0894dd528048300f3634904f245a43b3daf5929e915de463f64ec22f656d5964e7ca4cd9eae348086daa0fa52e89410040c5a9ba9fd73ef40da66c98a3c4f833d0994c2c6f94cb7823cf3744766a9ac37c4611588b88be4e6ade5f92c50301fca054f1773ac0c9eecd4c20ba77f8dec7ca5f715b5f57fe0ea66ee9684a693db0d04514304e74d6657e1ca64947b98bc2ebf51a2038a701dae22c0a4148730e9e4ed8a34812a5ff8134ea402859625f058d74d2bd253092938c05894fdb4ef99f3d7b036b968076c9728cedf20e0fe3cede86219ce4c252ccdeee722c65dafc9047d5f4e77f200131b187edeb7c065aa059eb42c1f3eb1863593f697963506a8d5a2863b938bf8cc9b7104bb184c51f39db11b8cfc7f8d731942eef2eed8590ffaa3a79eec23c1dd5466c4630c464021735b510c20bf468427329e5978470cfcfb388a37d76631288851e768a99b3ab00e6c6ef0f472d98a85f8364e4d3725e118c9b867a1f903102d20d312f8f7cc8933335784ce30de0b67ad52bf4bb54ef478c148a544e67b64a25ab0797c77f08a11e407720043c35502c62c6d5eaece645b02e7c17bb91c0a98efe1ba719178358ce02d3791b5d3e829ac96c1413d7074bc78388e4e370db2e4c0ffdeae05167f808edf4a9504963057843c87c54782a8157244e3ca927096475dfa690b72aaf81bce6a33d0e6e7796c29f71154f292a241d2b60460c492df15fba617464c4f5d7f73981f57a9f597963d5b1618154c351583541af62207c7c05fab0ef4a2821639d9cbef663bd09719aea411279cddc602284d32940840bed56b6918c58b2dac042f8e04dcc7684644ea70698736effb3a5b4197f57773cdeecefc2994f272629071f2a17c804043741a43c968ce8e1a05d701f63303b065e608a8a4a8e0c65200d35cf1a3b8d5bc3f08233ab6ccfb2e94a5a7ce6b4dfb4592f53b73d4085b0528bd17707a069e03b87de90d0aa2b1433adcf7a0e39e54bfbdecb73e40cf29ed19b48ded84ce18f819d257848542e12383d1d2e331e26aee1121e9d0035d04b0686715486e3ab01fb808020ef13c5b8fe5a502eb5d30dffac8102b7da87ae2eb798ffd89586aedcb9f6e8fa4cc36e5433530a951875f158dbf641d7cf617523a1e779c22671c4ed4b6a781726ca46c8694982842e2664febaf978c5bd18d46e264b6556c71458e7551cc02ff4ecb33024f8a6a2190d59404b748a588b5d8298cac55e83e1682eb8d0fdcc1ea01ed016d06380fdec53e5e94aa397d4f0fa9f0027657e422b57988d797846221ecb4dcc18b8a0a3458d4e05d0d2771ccd6f07d099a02969b4144d7803dc94489abfae973cee124b9697d16cc248b8fe205d62be4769260c6d1c1a9bb6d0fab03f38ec4a2af6259d2d30033ba52c94cd3fc76ccf2088b44d226f5386cb43d8f477ed1c25fb3502990018b45480e9ac2739f6971e86f13dc94a0311809a65ed16dba19ef9f63b11e4cc0651dd18c9f4d3eaae2b566d1147a3e561e8f6d11fcece2c379c068ad625b66b5d8b29532b1118de4169c8754feccf829c9e0bb14a7a9e14d642f88b41bbbb5300325a371f8e3494b9d29b376e7a9c2cb856d2b41135fbe9d020e3f0f0070de601d4aacecbbebb58d83043a47d128761a95d577424e4ba5ecec6ff22ac389782af6385d42009d27ac1961e1f01a8fe6fcc11a25477d90f803c5ecb764dc9a8b12b411c54f3af2d87b1e5d7ae4c183a13aaac18be66754f8b093f031bb788893ca81268fc316b454e3bae1c4750b54fd8aa9bc72c37604029ff7a46097af59af1f213aca62f0b1644fdad7ea1dcac0a396a08efdc6f7a8cd1650acacc467b4c032f4f0d6f55e9c113de3060953f09fa21ad95e36a4e323d2808c063938a4f7ac21c00ca08ffaccef40c72928cfc2abc9a165f76a9d34bf03c940a5812d57ea292808c3a8cb4024525b2f4fa918b1a413201ecfc412009daf7f31e05ee320393121e0122c8f5f8f56d5f03c2cb7ac23d7faaef201546e2d5759fa0a99d36f140adc6981850fcfa91c3232ced4a97f30fbbeb96c892944ffebf3e01cb06c5b3c1fbc90c5d26eed0546d12d51980d4c1ab00dfe4221a11024f3c67d8c63b3f4a048e0983e6bc464b763a1a0956789a09a3e0d5259bd142537a008c07c6c4f7f40acd26b06c9993543dbf31c003f632e4a9af4f7a27794a7795d5e394da6cc42842a20ad6cb28956d9ada34135233e252d8582dcaf5ee6a16190a00185b56badc273a24d94b000f0b61f484d7e0ec47c761ea1592dc1de1e414bc10227dd79f953ad55e7ae050560a75f6c3b2815950aeb8a5a411169069daedf6b4bceb25a36fd65793def5b635f3e48923598b2735e5f8f50b04e24287c4253cf9658e98f1213d8afac4424b266fb126ef6825e989f683dd3bc24962db9b0f78162bb82ef653561fee35cdd820d8e4b891c939398161d07a529bc07e6cdaba348e06c61997d2a7ace58aa2edc8cc5b277cab8d334dc6abadeb61081b90f09a3501093c02b1318c53445b09bbeb24ce3ba6aa26c87df663c6eec904e472a2d46a0e0d3641bfdb95d4f06bcf1b18680f57cbbb332684fe3bfd4e238531ade4e89419473f19cc7b9f707a86c73749af5454a81c5fbc1bfaa4c1c5ec0582605f35617edae16bd1e2c9640db2490b19083912599ed44a8399cea4de3e574fdad2dbdb019e7ed7c49ca1e7f4b1807c7a2afebc3715422a3fad9183ed774943e8731bfd4986fd0566a0b80505c51dd1ff56c821bf9be28ac3bdcb43da717e2587169c4521377afb582c991469764f0d6520b0c27d00bd3349478567fcea86fdd1fbd0d7c697b77b4d1473fe8b7564c6675248193840d230ebc552429c159fe9c0ae41fac81648c4348e747235f3c1f51632c3cd61ee53d405b0ed67ea0cfd9e0bd9d3fc3d71a0ec8c3fe22cd34bfff3c4c70fe73f278e0b036aec75b91275d01d67a4673081e67260898c457134dfdb8d141ef2ad6fbfc913705c64a60668098ac3bfe06c6ee157a026c7cb823285a8d69e0e772172c114407b9208de253b8372beee1ca7240b9872c63bd97ba966ecad75ad0ffe53d2513a9cf4cfa2faafea829324fec4927bfcf656d7b65d2887585f5a77a0d52a6334dcd89add97d1d30fb61412e8542d63721ffe8329cebad1c4200d1d6007b280db9a10c24d357006b8d84317657f583660a31f9f2946f290bce1c675043141ceed6136197f036dc7fc8a8c8f317eb6e9d36219505d16de60b65971c52152edffc2bac86bb0448f569d8"}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') signalfd4(r0, &(0x7f0000000500)={0x100000000}, 0x8, 0x0) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f00000004c0)) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="1df9ccef6c733f596d94562d28f0c5e2b9978d9676603d5b328e838a248c0176ed644d802f5ab73489142cf511ebae007c29546baf57254a71c70846c228339b95a299252359e866a1cceb1845efd48de4b5f0c79e8471cd0c7d7c2298789644238c38814020e3fee52f8d97627aa9133681eaca0c5b41566620c135b1405ac6ddc7c0a05ce745b79d7090b1ac3ac457f32b5d759988f5ea32d3eb683dbd700306d534f0c72853e30bf5f1f607634ffe68b3e8b7e91467cdef8905cb66a9c38f6ca791e30ffb554238cb1517ef43d18374ed2e7158c2e3ae4c7edc5ee3e25598ea60d8d7ba346c6e7b19", 0xea}, {&(0x7f00000002c0)="741184ae107d43de7778b8e7d13ec126d034a0d0d5f1223a99ceba7dc56f72f80083eb43f35a19beab852a0b9612cbf2eb91866c750df3945b2986b7d87d7e61c17c56bc33e6a5b4f96e7bfea12426671dbf79a1f46c17ad550cc6408b52ebd25d09161558ebcfa23c3b6956ea2282f1044bf120f0a8df3ed73d4618c3d86b8c937f367dcd9a5847d91cd9702ab52880aea3283660464384de906c53e843b97bdd760e00926bf5e2936fe5f2886272afedd8ce4201bf86edfa59b87f8339ecb5566515065746d322d8c0497ca35340c543204791aa03b5586e0cb0442e24d0dbe538adb39733e5c66219a35db7a442d96f7f7fd34276b0", 0xf7}, {&(0x7f00000003c0)="d51445cb57e871edb5f1b7f7ca16ab6886677a5ce7d9da9523e5534d4c38b6d9179730cbe98f12faf83e5d14dea5aabe51c84b29ea0fef48b1382ff6dbc10714242b2a03210943536682dfdc675428dcd204038b83496e4a2cac9139a91ec07c5d4ed5373a45d3240c78d7d1dfab6776642ae6dfe7ac7347260fe1475742e196a8fead184b72b7e70588ad871e3f7b326fd49c4dfcf88d0a6d9acb4ec9b3ff0da6ed9c1fc613", 0xa6}], 0x3, &(0x7f0000000100)=[{0x40, 0x29, 0x0, "06e1af790bb09ab88f4ecbf911b1dda0a762837bbd8433c85d0a5fc86536fba6d1654c9b88a23fd887f305d7a5790a"}, {0x20, 0x103, 0xff, "9ac573d00663d51035ac1574733890cc"}], 0x60, 0x8000}, 0x8004) preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:21 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xd, 0x8080fffffffe) 13:01:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) recvmmsg(r0, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}, 0x3}], 0x1, 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) listen(r1, 0x80000001) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:21 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000074004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:21 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0xff01000000000000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:21 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x502, 0x2) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000000)) 13:01:21 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x600000000000000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000000)={0xe2, &(0x7f00000001c0)="8eaabab12b2ee00d80cde6358b2167c07b7615a8e0e8f1b40ddabe515ccc35d56c9408836072a11ed4de24b4d3f3ad2c7d21e8f0e6caa60aa230ca898204f96b3b31973b22387371182b5852a4e1143ed859d2ff4a19bea2e854aa99be4230ec03dedbedacce6b2b589a6ec42953deedd3b124a7a200ec10107af1f93cb67f9331ebaa224b9c46fd7c0f99ee3aa4a935c1c54ea5d68adda6d7d1e72683572f558e8e50a7224d7d21cd17ffc5d5cd214ea192be474357f012a403250828954d9cf9ebb88ec165c412d52d395a54a6edf73690fbe5afea78d3bb525219272ffc9dbff5"}) 13:01:21 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x1, 0x0) r1 = socket$bt_hidp(0x1f, 0x3, 0x6) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendfile(r0, r1, &(0x7f0000000080), 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:21 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:21 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0xff010000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000f5ffffff00000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:22 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x300, 0x8080fffffffe) 13:01:22 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) sendmsg$NBD_CMD_CONNECT(r0, 0x0, 0x40805) 13:01:22 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x3f000000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:22 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') futex(&(0x7f0000000000)=0x1, 0x0, 0x2, &(0x7f0000000040)={0x77359400}, &(0x7f0000000100)=0x1, 0x2) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)=0x0) ptrace(0x11, r1) 13:01:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000900000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:22 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 485.678791] EXT4-fs: 6 callbacks suppressed [ 485.678803] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 13:01:22 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0xff01, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:22 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000005000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:22 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000007300)=0x9, 0x4) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000000)={{0xfff, 0x8}, {0x7a8, 0x4d}, 0x4, 0x6, 0x6}) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x17) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000100)={0x0, r3, 0x10001, 0x80000000, 0x8000, 0x4}) 13:01:22 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x9, 0x80) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f00000001c0)=""/148) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000100)) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000140)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) setsockopt$packet_buf(r0, 0x107, 0x1f, &(0x7f0000000300)="8a56c7c37c1df6a22adbd4d69f259af4c06292fb4f5e5d28d40cf464469937a42e0bdd7101e18267cdbaaa40e986aa709a2097d14514e6444efdf3389098e8a0e9579c51d69a9cb4c3d8093e44e1a3f27b227b404893952e72402f1373abcdee3975ff2f1e450eecff321a7e58791a282f60a5f19cc2db78ea7b7016b8766365b8e18f69dcab183d70814ab48be02db0c63171668d5d2b8b0ae3f4285b1bc1bb474a71c13f889b15440d04c8f7da63df4e06650e72f78beb7e7e1ce52a8598f0afdf6cc83ccdcce482d9a4a4e2ef056fc9f26b6f", 0xd4) preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:22 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x12, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:23 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x4000000000000000, 0x8080fffffffe) [ 485.940088] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 13:01:23 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x100000000000000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000003000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:23 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2000000, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:23 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xff01, 0x8080fffffffe) 13:01:23 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000040)={'ip6gretap0\x00'}) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:23 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x7000000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000006000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) [ 486.292202] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 13:01:23 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x980e, 0x8080fffffffe) 13:01:23 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) socketpair(0x9, 0xf, 0x9, &(0x7f00000001c0)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x4, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x7, @empty, 0x3}, {0xa, 0x4e22, 0x7c2caecd, @mcast1, 0xffffffffffff7fff}, r2, 0x9}}, 0x48) preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 13:01:23 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000040)={0x7, 0x1, 0x100000001}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:23 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x8cffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:23 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xc000, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00004c00000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:23 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x8, 0x8080fffffffe) 13:01:23 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x4000, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 486.713176] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 13:01:23 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x8bffffff00000000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:23 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:23 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x20000, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0xfffffffffffffffd) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000080004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:24 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x4, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:24 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/215, 0xd7}, {&(0x7f0000000580)=""/18, 0x12}, {&(0x7f00000002c0)=""/240, 0xf0}, {&(0x7f00000003c0)=""/178, 0xb2}, {&(0x7f0000000040)=""/3, 0x3}], 0x392, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) [ 487.001862] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 13:01:24 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x40000000, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:24 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x480400) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000040)=0x1) r1 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000b80)={0x0, 0x0}) r4 = geteuid() r5 = getegid() fcntl$getownex(r1, 0x10, &(0x7f0000000bc0)={0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@mcast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000d00)=0xe8) r8 = getegid() fcntl$getownex(r2, 0x10, &(0x7f0000001000)={0x0, 0x0}) r10 = geteuid() fstat(r1, &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getpid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004580)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000004540)=0x32adb9c7aa062bd5) r14 = getgid() fcntl$getownex(r2, 0x10, &(0x7f0000001200)={0x0, 0x0}) fstat(r0, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002340)={0x0, 0x0, 0x0}, &(0x7f0000002380)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002a40)={0x0}, &(0x7f0000002a80)=0xc) r19 = getuid() stat(&(0x7f0000002ac0)='./file0\x00', &(0x7f0000002b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000002b80)=0x0) stat(&(0x7f0000002bc0)='./file0\x00', &(0x7f0000002c00)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002c80)={0x0, 0x0, 0x0}, &(0x7f0000002cc0)=0xc) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000002ec0)=0x0) r25 = getuid() stat(&(0x7f0000002f00)='./file0\x00', &(0x7f0000002f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000003040)=[{&(0x7f0000000240)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f00000002c0)="387353a30672c9dbcd089d39a2ad5306a98887d12d6994b8e6d8eb0ad60e6866fcc2721fc0bf0c50a11cd581522b8009d390e1996f17bc52e02559e6e1a56414989dee0bbd9542a965daa8a236c3854851c6ddadf21e993b5afe9f32db", 0x5d}, {&(0x7f0000000340)="52ec006b621bfc726cf5d70bc2d4f90852df13e63871c26c791ba61fd11f20174ce445fe46ca386d6e5cb97ffe0af2a0ee74814255c6a9c73956da3e5b03b70d50bf6b34b7959585804e77ea016a16eb347ca3537646469a05903c7449a0c5b88b441ac6ca7987b65b2854cbc5e82d6045b8fe73b98bb8e7264424d4ad3a4a640ea2d62612f997e6a530", 0x8a}, {&(0x7f0000000400)="8d0f5a5a1ffd42eed213a9794b744ff1dc47264b5d61290261ae9008ee595cc29efe036b257286be", 0x28}], 0x3, 0x0, 0x0, 0x4008011}, {&(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000ac0)=[{&(0x7f0000001340)="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", 0x1000}, {&(0x7f0000000500)="b03ae6a4a57af1aede4c4825c465672def2c3bc7b944fa237f72c572f7c2c1039477b438e26fd20b2ab22370c9c372d363f38a9d9511f1b55034a994c168904e324f7a8d3285c5461ca3d8d5c558a0e6d966c42f6798fa72dc23ed681272951dd6864292f8e68ff8d8cbc75467f263c9054d2c344d4f892863d3ecdf8ef1ecfc3d2215a62966cef20babe0ea44f1a09622758e3a899a87e707e0836ee2696ce0798bfe78f417380af82a970341a5d3dff954824255efc8c3a550bdb57acc264e146f2176d547cc526fd593a027217ef15805", 0xd2}, {&(0x7f0000000600)="eba646f070e520deda8c83e9cd936a68da1c5bc540f6f1eaefa9a4c0e28260032f4382739aa144dd608c64595f295d30bb9b51b7f2fd676481a1502dd3e1ab60dfac48a177e7de3a2885d7dd56d1d03bf04248", 0x53}, {&(0x7f0000000680)="e8f5ff8a535ee6f0450b655416c83ca13630eec9ea150812aba25c3201109ad810ef3391c3432540a4eba08f749575134309c65706a28606586fdc7acd0ba25be33d89712189fc5b78f3da8dd85ee20303a4", 0x52}, {&(0x7f0000000700)="0d115ae1c56b05cd679532ea6bd2c9dab0cba61612d6323b68f7176c34078e0d18282c5eca3f8825f312f6b292992151980676072ca875c34259163ae96ce72adc05254d55bd916d275a50beac265517ac9a4c99197f29", 0x57}, {&(0x7f0000000780)="441f633f250f9f90d998c9ec436cae9c1ad3cf1761683a1d19b433f2acf714d43f9e88ac6c81dceb25e00c0bf30a9dcdb3b4b196b805f59e8772112212792a02824d665a1545a0313f76e3bb7b74f636a64ba895f8ea92b337f0473dcfa3bd224b7a71587d1bec5558abcfd74052cb3b6ec971f209a7568dacf566e09cd2870701ab08980642fe29cae61fdc4f6dc1dd9ad8a970f3", 0x95}, {&(0x7f0000000840)="4dc09c69fffa40d11552a6fe8c05993e353de7c6e6b78a8252cdc617073f4b98afeff3b6205602112af352fb20fc2a2b59d99cd71c4fde41cddcc5d4ed6774dd5893f7c5b16449e17a092527b6f8d8db986feebca14d8e09ad7d2c4c35ed77083a739cdee6f440143adfaf98229339c1407500e87134471580881103d647852ecb633251d44a4d310afc3c3cf8dbf439960dcb6bfda521abd781445b8b66d55f2d7acfd5ce995a5b822e80d7e4cc7416155dbade74814fbda2aa6fe44c6e4b82c292618a026be5dc5785263518e1b7261d9fca639894e3b313366a1bfd3d", 0xde}, {&(0x7f0000000940)="5cda1259b3ed6c804c29fd56630680eadcb1023254c5856f652daae93415dfd52ac5cc25f0e5a9bbd5002e47d19c05ae88b1dfb1b05d92b90a523051eaec898341a33cdcaef32cb883bc90011d475d43524b25b731f0da211927e4be64216ad0447a2b4cb2c4f285d6a21cdb90ed7b35c8707192bd07a4c5b792964840f433538c4a7b94ff30920d52b208a443ffd1e9ffdea1ac4e8a73fea5b17973d35fe0d7534b3323da2c5e81b4909f11ee70b18d95a2bb77c75c", 0xb6}, {&(0x7f0000000a00)="965d8e91e16b40c2b6412f40fe37e5c1ed2b86676cfbac82386143f6f3ab192f54d6ee9067c0b02edce37aa91793dd05ea94f4ebfe251b8c7ea4f7b007ffaf279c879e53ffd1da5092775aac6923519be2d69cda29234fc368ce1cf781a12131e2e2024b028df3fbfec47c5d5648d3d5c042f089655555b8e541411b278bf4646af919da84d3f5f5c580826fd2a90c2a63d04c3d4045355218e38fa7e9", 0x9d}], 0x9, &(0x7f0000000d40)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}, @cred={0x20, 0x1, 0x2, r6, r7, r8}], 0x40, 0xc000}, {&(0x7f0000000d80)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000fc0)=[{&(0x7f0000000e00)="6882021bfa3b46897d0686cbc945845b541fc0a8d74c09c54d55676c7adb2e7f578fbe4aacb5120e2219fe", 0x2b}, {&(0x7f0000000e40)="49611e55840a2e8ac9c8776a2752a835b0174d17c2be971cee09c0dc791aca884ddd53ef44e212fceb639562928c95dfa6bc8f1c7c5740a496f76e3d7239579e1f983767775204cfa208c7ae776217eaadd97346cb1bf8f242ba0cb03b0c28e8b743e7ac26f77f101a9983dbd100", 0x6e}, {&(0x7f0000000ec0)="595e156522e6e07646610e4aacf6a10f6572977d1469ae1f27cc283ed995d105ad653cbdc4a857b3d49b623c9c631517bb46ba7eb74b35cb5d8e67ff141dc4edb1e420c9654727499c0809896b026a147730df264c3a071c646ad7904e1e010d026d31e78980ce8e355f369608cffc349f781a47f4a0d0dd62650ef4010191b5f5ed1227646d8fdfa00e8d499abf0726aa1357c05057fe671bb36618d059a64dea0d6ddff709d33c423b4ac9082afc81e43b2744213f4cac8e1aaf4c2ba75f2a", 0xc0}, {&(0x7f0000000f80)="4c88c6b09249f12644fecc5895e7ebd01bb33d0291c17ed5a96d", 0x1a}], 0x4, &(0x7f00000023c0)=[@rights={0x18, 0x1, 0x1, [r2, r0]}, @cred={0x20, 0x1, 0x2, r9, r10, r11}, @cred={0x20, 0x1, 0x2, r12, r13, r14}, @cred={0x20, 0x1, 0x2, r15, r16, r17}], 0x78, 0x40880}, {&(0x7f0000002440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000029c0)=[{&(0x7f00000024c0)="6d3353f37372728a19e8464acea05583f807d7c98842647ce29cc38284a1c934f6fbac6ad910aa80bc5b1cc48259be1dfd3887a9a6bfce1773c5747c303dd3c32561c0a0435bd846fe3cf00d730cfa5a57dc33d943b12b672163a341c791365d4de2bccc945e5a740fb8d84982c29e27e9663d433e5c86d62a95a17b16702bbb7f2815c224d4cf75df", 0x89}, {&(0x7f00000025c0)="bfd9fbd7ed77aa1ac7694f11b4db7c4550dc2f3bf5d6603889ad36fb9be31fa9be6dc45d14a817dbf57be7079db3281279e87493ba4b7e7ac721920a4205ca62708281af95542f62bf2d0a7a318a55758e0c1b524045f9bc1dedd8a457b1a17a42b6796a430ff4dd8cf8d93724a6ff31f07aa95fe3042358611ac749239f48698e46c96ce8839975da53e8b8ec2732f2416f", 0x92}, {&(0x7f0000002680)="9084ec3336628c490ada9c1855a7769933b9701230c37e1c1f98b82798707a63b8b73ef4dc8b2ca6dbc48999f42b85a7462b26e76aa4744e07c55c10de21728a36037f144acd90d1f9f3f160c99f39ca7eca454c62ec8fd3454fe0187ef63ea003ae31e30f3ae83b3889a27da72621a9914f7930b3b46f836de8f351c6ffa5eb4437fb71c6d16ac41af34c9ff7291a4963b557415de97936e6ad27d3baeea8983bec391a422875224d0054bad9137de8d498064078b3dbfc6849c82fc817699b6570e39fc2beccf80634c25b68e39b2e6ea01c295011529bafc7d98d887d0abe606d53d68ad5b1e61c556058a5e105997bb949ff08", 0xf5}, {&(0x7f0000002780)="f97aec44804c0120f30221ea5c16369b275fa1eefb798e3d5faaa222cec764b66035a669a825709f5bc6be088f48b94240e72aaa4394c877c59ac1eaa47b50a30fc79892ac7e98b9fa3a9e985af5bd5d945294fc6561197962ff8bc179c7af2d957c779329fd953477e8a355f7e2a9ebf00ad13ad79cf47627ad55f1b226adaeb0", 0x81}, {&(0x7f0000002840)="516b4c836a3192d409f9b2ac737a5c004c2156821f1e7aac9c2df3ce685cbbded65477fc062f49b59bd1f9310f2f2fea72e2d70fd67e2b96a018520bc3c916c4e69493a5fd97bcdb10ed937a55fa09a22aa004e04580384cefd373a7744c849f8ba4d9718ea629c9604cac35ba59854651e692b2d63b62cebe9273640e2fce49cd399c5118f6816a91120a6e4c5cea6ec530e2564f55c14ff5d647c1f09dedae0a4eb9d3361cc790fb721f1557db775de3136980943952b7e1c76c604272d8a453a277cd9b1dfcdbb2ed9eefec7855df5c19661c527014f18112e1e58f879303", 0xe0}, {&(0x7f0000002940)="aafd4f33c2240510ba073195cd3aa097c9ede7fad41975fec883a8326aab5200ad2e66a2317cdecd8972394eae0bd61292ae9019fd787e47ba72cf8a3a21beac8d859e32c5792dffecc159bc847d0f1ff6c64b7caca12b", 0x57}], 0x6, &(0x7f0000002d00)=[@rights={0x20, 0x1, 0x1, [r2, r2, r1]}, @rights={0x18, 0x1, 0x1, [r2]}, @cred={0x20, 0x1, 0x2, r18, r19, r20}, @rights={0x28, 0x1, 0x1, [r2, r2, r2, r2, r2, r1]}, @rights={0x28, 0x1, 0x1, [r0, r1, r2, r2, r2, r0]}, @cred={0x20, 0x1, 0x2, r21, r22, r23}, @rights={0x20, 0x1, 0x1, [r1, r2, r2]}], 0xe8, 0x8010}, {&(0x7f0000002e00)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000002e80)=[{&(0x7f0000003540)="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", 0x1000}], 0x1, &(0x7f00000010c0)=ANY=[@ANYBLOB="30000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="000000002092d9c28c2cbd5a2aec35278c20af164b38b570551faa000000000000", @ANYRES32=r24, @ANYRES32=r25, @ANYRES32=r26, @ANYBLOB='\x00\x00\x00\x00'], 0x50, 0x4048010}], 0x5, 0x8800) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000140)={0x6, &(0x7f0000000100)=[{}, {0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r2, 0x4010641c, &(0x7f0000000200)={r27, &(0x7f00000001c0)=""/57}) 13:01:24 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x3, 0x5, 0xfff) recvmmsg(r0, &(0x7f0000003500), 0x0, 0x0, &(0x7f0000000000)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000007000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) [ 487.278591] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 13:01:24 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x5, 0x8080fffffffe) 13:01:24 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0xffffff8b, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:24 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) perf_event_open(&(0x7f0000000080)={0x400000000004, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r1, 0x540e, 0xfffffffffffffffe) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:24 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000140)=0x6) fcntl$setpipe(r0, 0x407, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_STD(0xffffffffffffff9c, 0x80085617, &(0x7f0000000040)=0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f0000000100)=r1) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000fff004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:24 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xa00, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:24 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x400000000000000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) [ 487.650947] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 13:01:24 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x3b00000000000000, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:24 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$UI_SET_SNDBIT(r2, 0x4004556a, 0x5) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f00000000c0)={'veth1_to_bond\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="3e000000000000008fb02fe454bdaefbb18cda590834220799055844d4031ef53fecd758a9043c56ee19536467cf0000000000000000000000000000"]}) close(r3) close(r2) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') lseek(r0, 0x0, 0x2) ioctl$PIO_UNIMAPCLR(r4, 0x4b68, &(0x7f0000000100)={0x1, 0x80}) preadv(r4, &(0x7f0000000480), 0x100000000000022c, 0x0) bind(r4, &(0x7f0000000000)=@llc={0x1a, 0x334, 0x10001, 0x7fffffff, 0x10000, 0x53d1, @remote}, 0x80) 13:01:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000007a00000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000050c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f00000000c0)={0x10, 0xfffffff5, 0x3}, 0x10) 13:01:24 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x200000000000000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) [ 487.920164] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 13:01:25 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xbf000000, 0x8080fffffffe) 13:01:25 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) getpid() ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x89a1) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000000)='security.SMACK64EXEC\x00', &(0x7f0000000040)='\x00', 0x1, 0x1) 13:01:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000040000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:25 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x20000000, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:25 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0xd000000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:25 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:25 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x806, 0x1) r2 = dup2(r0, r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x0, 0x100d}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x1, {0x1, 0x5, "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", 0xad, 0x1, 0x9, 0x76, 0x6, 0x200, 0x3}, r3}}, 0x128) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100), 0x4) mkdir(&(0x7f0000000040)='./file0\x00', 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000), 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r4, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 488.687759] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 13:01:25 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0xfeffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:25 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x80000, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:25 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x12000000, 0x8080fffffffe) 13:01:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000100004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:25 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x7, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:26 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000100)='net/ip_tables_names\x00'}, 0x30) perf_event_open(&(0x7f0000000000)={0x400000000001, 0x70, 0xfffffffffffffffc, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0xfffffffffffffffd, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x0, 0x80000000000) [ 488.915800] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 13:01:26 executing program 3: syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x802) r1 = dup2(r0, r0) write$binfmt_elf32(r1, &(0x7f0000001340)=ANY=[], 0x10ff) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000000c0)={0x0, 0x2, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "52d9b3be"}, 0x0, 0x0, @offset, 0x4}) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000340)) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f00000000c0)={{0x0, 0x0, 0x1}, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x3ff]}) 13:01:26 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x8, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000006c000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:26 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:26 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000000)=0x9, 0x4) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0xcb) 13:01:26 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xf5ffffff, 0x8080fffffffe) 13:01:26 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x3f00000000000000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000001f000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:26 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0x8000) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x3, 0x7, 0x2}}, 0x30) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:26 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x700, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:26 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0xc000000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:26 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x4006, 0x8080fffffffe) 13:01:26 executing program 3: syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x802) r1 = dup2(r0, r0) write$binfmt_elf32(r1, &(0x7f0000001340)=ANY=[], 0x10ff) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000000c0)={0x0, 0x2, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "52d9b3be"}, 0x0, 0x0, @offset, 0x4}) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000340)) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f00000000c0)={{0x0, 0x0, 0x1}, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x3ff]}) 13:01:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000001000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:26 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0xffffff8c, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:26 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:26 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x10, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:26 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xfffffff5, 0x8080fffffffe) 13:01:26 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f00000001c0)=""/176) 13:01:26 executing program 3: syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x802) r1 = dup2(r0, r0) write$binfmt_elf32(r1, &(0x7f0000001340)=ANY=[], 0x10ff) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000000c0)={0x0, 0x2, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "52d9b3be"}, 0x0, 0x0, @offset, 0x4}) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000340)) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f00000000c0)={{0x0, 0x0, 0x1}, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x3ff]}) 13:01:26 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0xfffffffe, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000002004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:26 executing program 3: syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x802) r1 = dup2(r0, r0) write$binfmt_elf32(r1, &(0x7f0000001340)=ANY=[], 0x10ff) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000000c0)={0x0, 0x2, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "52d9b3be"}, 0x0, 0x0, @offset, 0x4}) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000340)) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f00000000c0)={{0x0, 0x0, 0x1}, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x3ff]}) 13:01:26 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2d00000000000000, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:26 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xf0ffffffffffffff, 0x8080fffffffe) 13:01:26 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x10000000000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:26 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) r0 = socket$unix(0x1, 0x1, 0x0) recvfrom$unix(r0, &(0x7f0000000340)=""/172, 0xac, 0x10040, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x10001, 0x0) ioctl$TIOCGSID(r1, 0x5429, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r2, &(0x7f0000000140)=[{&(0x7f0000000000)=""/76, 0x4c}, {&(0x7f0000000100)=""/35, 0xfffffffffffffe43}, {&(0x7f00000001c0)=""/118, 0x76}, {&(0x7f00000002c0)=""/95, 0x5f}], 0x30a, 0x0) 13:01:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000001000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:26 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0xc00000000000000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:26 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f0000b67000), &(0x7f00007d0000)=0x4) 13:01:26 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x200000000000000, 0x8080fffffffe) 13:01:27 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x42082, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000200)) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x201, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x7, {0x7, 0x1c, 0x2, 0x1, 0x1, 0x800, 0x5, 0x3}}, 0x50) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000001c0)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000040)='net/ip_tables_names\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-monitor\x00', 0x200000, 0x0) 13:01:27 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xf5ffffff, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:27 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x3f00) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000200000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/148, 0x386}], 0x1000024b, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='limits\x00') preadv(r0, &(0x7f0000000480), 0x100000000000002e, 0x0) 13:01:27 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x4000000, 0x8080fffffffe) 13:01:27 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0xff0f) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:27 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2, 0x80) 13:01:27 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0a5c2d023c126285718070") r1 = socket(0x400020000000010, 0x2, 0x0) write(r1, &(0x7f0000000000)="1f00000056000d6dfcffff05bc0203030701ff2104173f8100000002030039", 0x1f) 13:01:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000fffffff500000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:27 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf5ffffff00000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:27 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={0xffffffffffffffff, r0, 0xf, 0x3}, 0x10) 13:01:27 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x3f000000, 0x8080fffffffe) 13:01:27 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x1200) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:27 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f0000000100)={0x5, "a27556e9ce5e7284578315fe79faa6d1508011c34d60a85bf7889cf85984ef6e", 0x2, 0x900, 0x2, 0x9, 0x10, 0x3, 0x3ff, 0x2}) lsetxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='security.evm\x00', &(0x7f0000000200)=@ng={0x4, 0x12, "68a45cbd544fa4df7db2c28ea0"}, 0xf, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000fffffdfc00000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:27 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x8cffffff00000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='syz_tun\x00', 0x10) sendto$inet6(r0, 0x0, 0x0, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_extract_tcp_res$synack(&(0x7f0000000100), 0x1, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) [ 490.385207] Unknown ioctl -1068214755 13:01:27 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:27 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x200b, 0x8080fffffffe) 13:01:27 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 490.484406] Unknown ioctl -1068214755 13:01:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() prlimit64(r0, 0xe, &(0x7f00000000c0)={0x3, 0x56}, &(0x7f0000000140)) 13:01:27 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000100)={0x9, 0x994, 0x9, [], &(0x7f0000000040)=0x100}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2000, 0x0) preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:27 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0xd00000000000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x720000, 0xffffffff7ff0bdbe}) dup3(r0, r1, 0x0) 13:01:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000020000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:27 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xb20, 0x8080fffffffe) 13:01:27 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xa00, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 490.676184] vhci_hcd: default hub control req: 00e0 vdb2f i0001 l23710 [ 490.701052] vhci_hcd: default hub control req: 00e0 vdb2f i0001 l23710 13:01:27 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='net/ip_tables_names\x00', r0}, 0x10) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:27 executing program 3: creat(&(0x7f0000000640)='./file0\x00', 0x0) 13:01:27 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x1200000000000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000023000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:27 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x500, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:27 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x10010, &(0x7f0000001700)={[{@inline_data='inline_data'}, {@discard='discard'}, {@background_gc_on='background_gc=on'}, {@heap='heap'}, {@alloc_mode_def='alloc_mode=default'}, {@alloc_mode_reuse='alloc_mode=reuse'}, {@background_gc_off='background_gc=off'}, {@noflush_merge='noflush_merge'}, {@nobarrier='nobarrier'}], [{@uid_gt={'uid>'}}]}) 13:01:27 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xfbffffff00000000, 0x8080fffffffe) 13:01:27 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x40000000000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:28 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') clock_gettime(0x0, &(0x7f0000000e80)={0x0, 0x0}) nanosleep(&(0x7f0000000ec0)={r1, r2+30000000}, &(0x7f0000000f00)) clock_gettime(0x0, &(0x7f0000000e00)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000000d00)=[{{&(0x7f0000000000)=@can, 0x80, &(0x7f0000000140)=[{&(0x7f0000000100)=""/50, 0x32}, {&(0x7f00000001c0)=""/167, 0xa7}, {&(0x7f0000000280)=""/138, 0x8a}], 0x3, 0x0, 0x0, 0x4}, 0x3}, {{&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000000740)=[{&(0x7f00000003c0)=""/232, 0xe8}, {&(0x7f00000004c0)=""/72, 0x48}, {&(0x7f0000000540)=""/213, 0xd5}, {&(0x7f0000000640)=""/201, 0xc9}], 0x4, &(0x7f0000000780)=""/222, 0xde, 0xfffffffffffffffd}, 0x2}, {{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000000880)=""/180, 0xb4}, {&(0x7f0000000940)=""/193, 0xc1}, {&(0x7f0000000a40)=""/103, 0x67}], 0x4, 0x0, 0x0, 0x80}, 0x7}, {{&(0x7f0000000b00)=@l2, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000000b80)=""/90, 0x5a}, {&(0x7f0000000c00)=""/138, 0x8a}], 0x2, 0x0, 0x0, 0x1}, 0x8001}], 0x4, 0x40, &(0x7f0000000e40)={r3, r4+10000000}) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) clock_gettime(0x0, &(0x7f0000000f40)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f0000000f80)={{0x77359400}, {r5, r6+30000000}}, &(0x7f0000000fc0)) 13:01:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000fffffff6004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:28 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0xff0f000000000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) [ 490.971354] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 491.010522] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 13:01:28 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:28 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xc000000, 0x8080fffffffe) [ 491.067500] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 491.092554] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock [ 491.115440] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 491.131634] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 13:01:28 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x100000000000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:28 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffff5, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 491.160877] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 491.174758] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock 13:01:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000fffffdfd004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:28 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x8cffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) [ 491.240466] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 491.275728] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 491.304089] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 491.311218] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock [ 491.331040] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 491.338468] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 491.346269] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 491.353636] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock 13:01:28 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000440)={0x1f, {0x9, 0x291a, 0x0, 0xfc}, 0x1}, 0xa) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) getpid() ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x89a1) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000000)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x1) 13:01:28 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x40000000, 0x8080fffffffe) 13:01:28 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffff7f00000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:28 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x40) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000040)=0x81) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000fff00000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:28 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x600) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:28 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:28 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xc000, 0x8080fffffffe) 13:01:28 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000440)={0x1f, {0x9, 0x291a, 0x0, 0xfc}, 0x1}, 0xa) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) getpid() ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x89a1) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000000)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x1) 13:01:28 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:29 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xe80d, 0x8080fffffffe) 13:01:29 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0xfffffff6) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000900000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:29 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x9, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:29 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x2) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x10000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect(r2, &(0x7f0000000240)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0x33) close(r2) dup2(r0, r1) 13:01:29 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0xf6ffffff00000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:29 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x4, 0x8080fffffffe) 13:01:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000ffffff8c004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:29 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10000000000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:29 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc\x00', 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) r1 = getpid() prlimit64(r1, 0x0, 0x0, &(0x7f0000000140)) getgroups(0x0, &(0x7f0000000800)) fallocate(r0, 0x40, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 13:01:29 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r0, &(0x7f0000000000), 0x1000000000000051, 0x4d) 13:01:29 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0xfeffffff00000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:29 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x2, 0x0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) fcntl$setpipe(r0, 0x407, 0x9e) r3 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40, 0x0) ioctl$EVIOCGEFFECTS(r3, 0x80044584, &(0x7f0000000340)=""/4096) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r1, r0, &(0x7f00000000c0), 0x2) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, 0x0, &(0x7f0000000300)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xfffffffffffffff8) 13:01:29 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000068000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:29 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000100)=""/128) write$P9_RREMOVE(r0, &(0x7f0000000040)={0x7, 0x7b, 0x1}, 0x7) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:29 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0xc00000000000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:29 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x9) 13:01:30 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x2000000000000, 0x8080fffffffe) 13:01:30 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0xfeffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000000000004c004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:30 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xc000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = getpid() prlimit64(r0, 0x0, 0x0, 0x0) getgroups(0x0, 0x0) 13:01:30 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r0, 0x0, 0x14, &(0x7f0000000000)='net/ip_tables_names\x00'}, 0x30) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=0x0) tgkill(r1, r2, 0x3e) 13:01:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400218) write$FUSE_LSEEK(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000002c0)='fuse\x00', 0xfffffffffffffffe) 13:01:30 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2d00000000000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:30 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0xf6ffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:30 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ptrace$cont(0x7, r2, 0x9, 0x4) preadv(r1, &(0x7f0000000000), 0x10000049, 0x0) 13:01:30 executing program 3: 13:01:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000ffffff8c00000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:30 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x9000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:30 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x1000000, 0x8080fffffffe) 13:01:30 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x8000) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) dup3(r1, r1, 0x80000) 13:01:30 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0xc) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:30 executing program 3: 13:01:30 executing program 3: 13:01:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000003f000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:30 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x8bffffff00000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:30 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x500000000000000, 0x8080fffffffe) 13:01:30 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3b00000000000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:30 executing program 3: 13:01:30 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ustat(0x8, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:30 executing program 3: 13:01:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000007a000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:30 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0xff01000000000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:30 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:30 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xffffffffffff0700, 0x8080fffffffe) 13:01:30 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0xa58) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x100, 0x501200) r1 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x6, 0x200001) ioctl$TIOCGSID(r1, 0x5429, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:30 executing program 3: 13:01:31 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x8580200) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:31 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffff7f, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:31 executing program 3: 13:01:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000040004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:31 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x1, 0x0) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f00000001c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000280)=0x1e) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000000)) preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f00000002c0)=""/151) 13:01:31 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x1000000000000000, 0x8080fffffffe) 13:01:31 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:31 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x80000000000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:31 executing program 3: 13:01:31 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) fsetxattr$security_capability(r0, &(0x7f0000000500)='security.capability\x00', &(0x7f0000000540)=@v1={0x1000000, [{0xee20, 0x20}]}, 0xc, 0x3) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000480)='fd/4\x00') ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, &(0x7f00000004c0)=0x7fff) gettid() ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x7f) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000040)='net/ip6_tables_names\x00') preadv(r4, &(0x7f0000000180)=[{&(0x7f0000000200)=""/117, 0x45a}, {&(0x7f0000000280)=""/241, 0xffed}, {&(0x7f0000000380)=""/221, 0xdd}], 0x3, 0x800000) 13:01:31 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:31 executing program 3: 13:01:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000000000006c004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:31 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x6000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:31 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xbf00, 0x8080fffffffe) 13:01:31 executing program 3: 13:01:31 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3ff7f8, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:31 executing program 3: 13:01:31 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0xc000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:31 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) preadv(r0, &(0x7f00000014c0)=[{&(0x7f0000000000)=""/58, 0x3a}, {&(0x7f0000000100)=""/123, 0x7b}, {&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/149, 0x95}, {&(0x7f0000000040)=""/21, 0x15}, {&(0x7f0000001340)=""/222, 0xde}, {&(0x7f0000001440)=""/115, 0x73}], 0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000007fffffff004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:31 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xde8, 0x8080fffffffe) 13:01:31 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf8f73f0000000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:31 executing program 3: 13:01:31 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$SCSI_IOCTL_DOORLOCK(r1, 0x5380) getpgrp(0x0) r2 = fcntl$getown(r0, 0x9) r3 = syz_open_procfs(r2, &(0x7f0000000100)='fdinfo/3\x00') ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000000)={0xf0}) preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:31 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x800000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:31 executing program 3: 13:01:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00008cffffff00000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:31 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x980e000000000000, 0x8080fffffffe) 13:01:31 executing program 3: 13:01:31 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:31 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x8bffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:31 executing program 3: 13:01:31 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f0000000000)=""/115, 0x73}], 0xb4}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000001c0)="61df0f7872ed6c8061ca2b80aa67d1db92e9d6e88fb5c1493675e71a7aaf79a524ec8df56ab08b8b1e89f787af0a998bb86c0a2b4cc17dd390d3c1a14fe2193ef9162316ada66cd9339a55f869ac6d7cf63f66bbd3b5f593cec5a99872e57c9a29b30e8710a0825cb912b0e27fb01a6d5191515732dec722c0ceb1579f625045d759821c57c1df24138a5a025dca996da5a337639083b1cd1fb0fbeeb3ebe3b4818463d608432902", 0xa8) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:32 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:32 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xfeffffff00000000, 0x8080fffffffe) 13:01:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000600000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:32 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0xff010000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:32 executing program 3: 13:01:32 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000001c0)) exit_group(0x1ff) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:32 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:32 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0xc00) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:32 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xfffffff0, 0x8080fffffffe) 13:01:32 executing program 3: 13:01:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000004004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:32 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0xd) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:32 executing program 3: 13:01:32 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x80000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:32 executing program 3: 13:01:32 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0xe4ffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000002000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:32 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') getpeername(r1, &(0x7f0000000340)=@hci={0x1f, 0x0}, &(0x7f00000003c0)=0x80) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000280)={r1, r1}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000400)={@local, 0x59, r2}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000001c0)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000240)={r3, 0x3, 0xfffffffffffffffe}, 0x8) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$getregset(0x4204, r4, 0x207, &(0x7f0000000100)={&(0x7f0000000040)=""/17, 0x11}) preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) ptrace$peek(0x3, r4, &(0x7f0000000140)) 13:01:32 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x2000000, 0x8080fffffffe) 13:01:32 executing program 3: 13:01:32 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:32 executing program 3: 13:01:32 executing program 3: 13:01:32 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x3f000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:32 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x90050000, 0x8080fffffffe) 13:01:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000500000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:32 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:32 executing program 3: 13:01:32 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xa03, 0x202) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$TIOCGSID(r0, 0x5429, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd160-generic\x00'}, 0x58) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl(r3, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r4 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg(r4, &(0x7f0000000000)=[{{0x0, 0x0, 0x0}}], 0x5, 0x0) preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:32 executing program 3: 13:01:32 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0xd00) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000004c000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:32 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf83f00, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:32 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x7fffffffffffffff, 0x8080fffffffe) 13:01:33 executing program 3: 13:01:33 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x12) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:33 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x2080) ioctl$TIOCGPTPEER(r0, 0x5441, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x74) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, r1, 0x0, 0x14, &(0x7f0000000380)='net/ip_tables_names\x00'}, 0x30) r3 = syz_open_procfs(r2, &(0x7f0000000340)='net/ip_vs_stats_percpu\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:33 executing program 3: 13:01:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00006800000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:33 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x900, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:33 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x900000000000000, 0x8080fffffffe) 13:01:33 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x12000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:33 executing program 3: 13:01:33 executing program 3: 13:01:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00002300000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:33 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x200000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:33 executing program 3: 13:01:33 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xffffffff00000000, 0x8080fffffffe) 13:01:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r0, &(0x7f000000b5c0)=[{&(0x7f000000b3c0)=""/79, 0xfffffffffffffc97}, {&(0x7f000000b440)=""/143}, {&(0x7f00000077c0)=""/58}, {&(0x7f0000007980)=""/52}, {&(0x7f0000007d80)=""/13}, {&(0x7f000000b500)=""/173}], 0x10000000000001ea, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f00000012c0)=0x3) getsockopt$inet_buf(r1, 0x0, 0x400000000000485, &(0x7f0000000040)=""/24, &(0x7f00000002c0)=0xb) recvmmsg(r0, &(0x7f000000adc0)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f0000000440)=[{&(0x7f00000001c0)=""/181, 0xb5}, {&(0x7f0000000100)=""/75, 0x4b}, {&(0x7f0000000280)=""/173, 0xad}, {&(0x7f0000000340)=""/65, 0x41}, {&(0x7f00000003c0)=""/93, 0x5d}], 0x5, &(0x7f00000004c0)=""/188, 0xbc, 0x3}, 0xfffffffffffffffe}, {{&(0x7f0000000580)=@rc, 0x80, &(0x7f0000000940)=[{&(0x7f0000000600)=""/119, 0x77}, {&(0x7f0000000680)=""/150, 0x96}, {&(0x7f0000000740)=""/193, 0xc1}, {&(0x7f0000000840)=""/46, 0x2e}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000000880)=""/65, 0x41}, {&(0x7f0000003540)=""/4096, 0x1000}, {&(0x7f0000004540)=""/4096, 0x1000}, {&(0x7f0000000900)=""/60, 0x3c}], 0x9, &(0x7f0000000a00)=""/237, 0xed, 0x8001}}, {{&(0x7f0000000b00)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000b80)=""/247, 0xf7}, {&(0x7f0000000c80)=""/88, 0x58}, {&(0x7f0000000d00)=""/78, 0x4e}, {&(0x7f0000005540)=""/4096, 0x1000}, {&(0x7f0000000d80)=""/214, 0xd6}, {&(0x7f0000000e80)=""/115, 0x73}, {&(0x7f0000000f00)=""/14, 0xe}, {&(0x7f0000000f40)=""/93, 0x5d}], 0x8, &(0x7f0000001040)=""/80, 0x50, 0x5}}, {{&(0x7f00000010c0)=@nfc, 0x80, &(0x7f00000027c0)=[{&(0x7f0000001140)=""/66, 0x42}, {&(0x7f00000011c0)=""/148, 0x94}, {&(0x7f0000002340)=""/195, 0xc3}, {&(0x7f0000002440)=""/237, 0xed}, {&(0x7f00000025c0)=""/198, 0xc6}, {&(0x7f0000001280)=""/8, 0x8}, {&(0x7f00000026c0)=""/254, 0xfe}, {&(0x7f0000002540)=""/51, 0x33}], 0x8, &(0x7f0000006540)=""/4096, 0x1000, 0x4}, 0x7}, {{0x0, 0x0, &(0x7f0000002900)=[{&(0x7f0000002840)=""/156, 0x9c}], 0x1, &(0x7f0000002940)=""/73, 0x49, 0x3}, 0x400000}, {{&(0x7f00000029c0)=@nfc_llcp, 0x80, &(0x7f0000002ec0)=[{&(0x7f0000002a40)=""/118, 0x76}, {&(0x7f0000002ac0)=""/206, 0xce}, {&(0x7f0000002bc0)=""/127, 0x7f}, {&(0x7f0000002c40)=""/93, 0x5d}, {&(0x7f0000002cc0)=""/116, 0x74}, {&(0x7f0000002d40)=""/103, 0x67}, {&(0x7f0000002dc0)=""/9, 0x9}, {&(0x7f0000002e00)=""/189, 0xbd}], 0x8, 0x0, 0x0, 0xffff}, 0x6}, {{&(0x7f0000002f40)=@sco, 0x80, &(0x7f0000007600)=[{&(0x7f0000002fc0)=""/122, 0x7a}, {&(0x7f0000003040)=""/255, 0xff}, {&(0x7f0000003140)=""/180, 0xb4}, {&(0x7f0000003200)=""/189, 0xbd}, {&(0x7f00000032c0)=""/61, 0x3d}, {&(0x7f0000003300)=""/136, 0x88}, {&(0x7f00000033c0)=""/120, 0x78}, {&(0x7f0000003440)=""/152, 0x98}, {&(0x7f0000007dc0)=""/4096, 0x1000}, {&(0x7f0000007540)=""/137, 0x89}], 0xa, &(0x7f00000076c0)=""/93, 0x5d, 0x2}, 0x7f}, {{&(0x7f0000007740)=@generic, 0x80, &(0x7f00000077c0), 0x0, &(0x7f0000008dc0)=""/4096, 0x1000, 0x100000001}, 0x80000000}, {{&(0x7f0000007800)=@rc, 0x80, &(0x7f0000007bc0)=[{&(0x7f0000009dc0)=""/4096, 0x1000}, {&(0x7f0000007880)=""/212, 0xd4}, {&(0x7f0000007980)}, {&(0x7f00000079c0)=""/233, 0xe9}, {&(0x7f0000007ac0)=""/96, 0x60}, {&(0x7f0000007b40)=""/84, 0x54}], 0x6, &(0x7f0000007c40)=""/37, 0x25, 0x100000001}, 0x8}], 0x9, 0x12000, &(0x7f0000007c80)) 13:01:33 executing program 3: 13:01:33 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0xff0f0000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000fdfdffff00000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:33 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:33 executing program 3: 13:01:33 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x9000000, 0x8080fffffffe) 13:01:33 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x5000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:33 executing program 3: 13:01:33 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x400000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='set/ip_tables_names\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000007004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:33 executing program 3: 13:01:33 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x7000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:33 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x2, 0x8080fffffffe) 13:01:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000000000)) 13:01:33 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xa000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:33 executing program 3: 13:01:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000003f00000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:34 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3b, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:34 executing program 3: 13:01:34 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0xff01) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:34 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x8, 0x20000) recvmmsg(r0, &(0x7f0000003500), 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:34 executing program 3: 13:01:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00007fffffff00000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:34 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xc000000000000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:34 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xf4ffffff00000000, 0x8080fffffffe) 13:01:34 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x700) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:34 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') ioctl$UI_DEV_CREATE(r0, 0x5501) recvmmsg(r0, &(0x7f0000000440)=[{{&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000340)=[{&(0x7f00000001c0)=""/154, 0x9a}, {&(0x7f0000000100)=""/87, 0x57}, {&(0x7f0000000280)=""/174, 0xae}], 0x3, &(0x7f0000000380)=""/188, 0xbc, 0xffffffffffffff94}, 0x3}], 0x1, 0x40000000, &(0x7f0000000480)={0x77359400}) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:34 executing program 3: 13:01:34 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000500000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:34 executing program 3: 13:01:34 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:34 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x858020000000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:35 executing program 3: 13:01:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000700000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:35 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10d002, 0x1) r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x3, 0x2) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x7) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xab5, 0x80000) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000100)) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f00000002c0)=0x7, 0x4) preadv(r0, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/243, 0xf3}], 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:35 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xb000000000000000, 0x8080fffffffe) 13:01:35 executing program 3: 13:01:35 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x100000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:35 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x25808) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:35 executing program 3: 13:01:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000200000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:35 executing program 3: 13:01:35 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf5ffffff, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:35 executing program 5: 13:01:35 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x6) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:35 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xe4ffffff00000000, 0x8080fffffffe) 13:01:35 executing program 5: 13:01:35 executing program 3: ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff, 0x3}, 0x20) 13:01:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000005004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:35 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0xd000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:35 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xc0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000fffffe, 0x1) statx(r0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000180)={0x100323, 0x2}) 13:01:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000fffffe, 0x1) statx(0xffffffffffffffff, 0x0, 0x4000, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000180)={0x100323, 0x2}) 13:01:35 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xd00, 0x8080fffffffe) 13:01:35 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x2000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:35 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3ff800, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:35 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x4000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000e8200000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:35 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3f00, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:35 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xc00, 0x8080fffffffe) 13:01:35 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000fffffe, 0x1) statx(r0, 0x0, 0x4000, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000180)={0x100323, 0x2}) 13:01:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000048000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:36 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x7) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:36 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x8, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:36 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x809, 0x8080fffffffe) 13:01:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000820e000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000fffffe, 0x1) statx(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000180)={0x100323, 0x2}) 13:01:36 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3b00, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:36 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x3f00000000000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:36 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xe98, 0x8080fffffffe) 13:01:36 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000048004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:36 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x2080) ioctl$TIOCGPTPEER(r0, 0x5441, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x74) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, r1, 0x0, 0x14, &(0x7f0000000380)='net/ip_tables_names\x00'}, 0x30) r3 = syz_open_procfs(r2, &(0x7f0000000340)='net/ip_vs_stats_percpu\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:36 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x4000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:36 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x2080) ioctl$TIOCGPTPEER(r0, 0x5441, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x74) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, r1, 0x0, 0x14, &(0x7f0000000380)='net/ip_tables_names\x00'}, 0x30) r3 = syz_open_procfs(r2, &(0x7f0000000340)='net/ip_vs_stats_percpu\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:36 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000000000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:36 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xfffffffe, 0x8080fffffffe) 13:01:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000068004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:36 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x200000000000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000040000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:36 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:36 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0xfffffffe) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:37 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x2080) ioctl$TIOCGPTPEER(r0, 0x5441, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x74) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, r1, 0x0, 0x14, &(0x7f0000000380)='net/ip_tables_names\x00'}, 0x30) r3 = syz_open_procfs(r2, &(0x7f0000000340)='net/ip_vs_stats_percpu\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:37 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0xffffff8c) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000006800000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000040000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:37 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xe80d0000, 0x8080fffffffe) 13:01:37 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:37 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0xe4ffffff00000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:37 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$SCSI_IOCTL_DOORLOCK(r1, 0x5380) getpgrp(0x0) r2 = fcntl$getown(r0, 0x9) r3 = syz_open_procfs(r2, &(0x7f0000000100)='fdinfo/3\x00') ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000000)={0xf0}) preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000006c00000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:37 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x60010000, 0x8080fffffffe) 13:01:37 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2d, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:37 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0xffffffff00000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:37 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x2080) ioctl$TIOCGPTPEER(r0, 0x5441, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x74) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, r1, 0x0, 0x14, &(0x7f0000000380)='net/ip_tables_names\x00'}, 0x30) r3 = syz_open_procfs(r2, &(0x7f0000000340)='net/ip_vs_stats_percpu\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:37 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:37 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x42082, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000200)) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x201, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x7, {0x7, 0x1c, 0x2, 0x1, 0x1, 0x800, 0x5, 0x3}}, 0x50) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000001c0)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000040)='net/ip_tables_names\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-monitor\x00', 0x200000, 0x0) 13:01:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000300000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:37 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x200000, 0x8080fffffffe) 13:01:37 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x700000000000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:37 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:37 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0xffffff8b) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000007400000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:37 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x806, 0x1) r2 = dup2(r0, r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x0, 0x100d}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x1, {0x1, 0x5, "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", 0xad, 0x1, 0x9, 0x76, 0x6, 0x200, 0x3}, r3}}, 0x128) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100), 0x4) mkdir(&(0x7f0000000040)='./file0\x00', 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000), 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r4, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:37 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xd000000, 0x8080fffffffe) 13:01:37 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x9, 0x80) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f00000001c0)=""/148) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000100)) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000140)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) setsockopt$packet_buf(r0, 0x107, 0x1f, &(0x7f0000000300)="8a56c7c37c1df6a22adbd4d69f259af4c06292fb4f5e5d28d40cf464469937a42e0bdd7101e18267cdbaaa40e986aa709a2097d14514e6444efdf3389098e8a0e9579c51d69a9cb4c3d8093e44e1a3f27b227b404893952e72402f1373abcdee3975ff2f1e450eecff321a7e58791a282f60a5f19cc2db78ea7b7016b8766365b8e18f69dcab183d70814ab48be02db0c63171668d5d2b8b0ae3f4285b1bc1bb474a71c13f889b15440d04c8f7da63df4e06650e72f78beb7e7e1ce52a8598f0afdf6cc83ccdcce482d9a4a4e2ef056fc9f26b6f", 0xd4) preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:38 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x400000000000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000004000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:38 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf83f0000000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:38 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000007300)=0x9, 0x4) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000000)={{0xfff, 0x8}, {0x7a8, 0x4d}, 0x4, 0x6, 0x6}) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x17) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000100)={0x0, r3, 0x10001, 0x80000000, 0x8000, 0x4}) 13:01:38 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xb0000000, 0x8080fffffffe) 13:01:38 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x10000000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000c0ed0000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000100)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000140)={0x7, 0xace1, 0x4, 0x4, 0x7fffffff}, 0x14) 13:01:38 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:38 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xff0f0000, 0x8080fffffffe) 13:01:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000002300000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:38 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:38 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001280)={&(0x7f00000011c0)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000002780)=[{&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/252, 0xfc}, {&(0x7f0000002440)=""/239, 0xef}, {&(0x7f00000025c0)=""/139, 0x8b}, {&(0x7f0000001240)=""/60, 0x3c}, {&(0x7f0000002680)=""/240, 0xf0}], 0x6, &(0x7f0000002800)=""/105, 0x69, 0x3}, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) r2 = add_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000001c0)="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", 0x1000, 0xfffffffffffffffd) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f00000028c0)={0xa10004, 0x6, 0x9, [], &(0x7f0000002880)={0xbb097e, 0x200, [], @p_u32=&(0x7f0000002540)=0xfffffffffffff001}}) keyctl$assume_authority(0x10, r2) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000100)) 13:01:38 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x600000000000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:38 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000007300)=0x9, 0x4) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000000)={{0xfff, 0x8}, {0x7a8, 0x4d}, 0x4, 0x6, 0x6}) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x17) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000100)={0x0, r3, 0x10001, 0x80000000, 0x8000, 0x4}) 13:01:38 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x100000, 0x8080fffffffe) 13:01:38 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3b000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x3ffffffffffff98, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) r1 = getpgrp(0x0) process_vm_writev(r1, &(0x7f0000000140)=[{&(0x7f0000000000)=""/76, 0x4c}, {&(0x7f00000001c0)=""/133, 0x85}, {&(0x7f0000000100)=""/39, 0x27}], 0x3, &(0x7f0000000740)=[{&(0x7f0000000280)=""/118, 0x76}, {&(0x7f0000000300)=""/125, 0x7d}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/162, 0xa2}, {&(0x7f00000004c0)=""/131, 0x83}, {&(0x7f0000000580)=""/111, 0x6f}, {&(0x7f0000000600)=""/145, 0x91}, {&(0x7f00000006c0)=""/95, 0x5f}], 0x8, 0x0) 13:01:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000400000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:38 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0xffffffe4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:39 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x1000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:39 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:39 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) r2 = syz_open_pts(r1, 0x100) r3 = shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x5000) shmdt(r3) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) ioctl(r2, 0x1, &(0x7f0000000100)="069309b533941413400f36ad5ccb9507f5ffb2c59a38aaa76b6756ce61fa4ab29593acb8fb2a984fd09f3296c083fd900012a0dc5637bcaa495235a62f62fa92a7dd9559359aab590a9d95a6b2d8b260db0e9b855f89e7c55b600ab30625c24ddc6c5a13110a27725600e85a55077a") r4 = fcntl$getown(r2, 0x9) r5 = syz_open_procfs(r4, &(0x7f00000001c0)='net/ip_tables_names\x00') preadv(r5, &(0x7f0000000000)=[{&(0x7f0000000280)=""/168, 0xffffff7c}], 0xfffff68, 0x0) 13:01:39 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xfbffffff, 0x8080fffffffe) 13:01:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00005f42485266535f4d004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:39 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xc1, 0x402880) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042dbd7000ffdbdf250300000004000500080001004e210000"], 0x20}}, 0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(r0, 0x5429, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') socket$nl_generic(0x10, 0x3, 0x10) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r3 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000440)={0x3d, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_THREAD_EXIT(r3, 0x40046208, 0x0) preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 502.261051] binder: release 25274:25275 transaction 16 out, still active [ 502.288129] binder: unexpected work type, 4, not freed [ 502.294438] binder: undelivered TRANSACTION_COMPLETE 13:01:39 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000007300)=0x9, 0x4) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000000)={{0xfff, 0x8}, {0x7a8, 0x4d}, 0x4, 0x6, 0x6}) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x17) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000100)={0x0, r3, 0x10001, 0x80000000, 0x8000, 0x4}) 13:01:39 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8001, 0x20000) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ff7f0000300000000000000000000000000003000800000000000000000800000000000000000000000000000000000000000000000000000000000000800000ff0f000006000000000000000900000000000000faffffffffffffff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c70000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {}]}) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:39 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x5, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:39 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xb0, 0x8080fffffffe) 13:01:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000004c00000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:39 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xc1, 0x402880) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042dbd7000ffdbdf250300000004000500080001004e210000"], 0x20}}, 0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(r0, 0x5429, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') socket$nl_generic(0x10, 0x3, 0x10) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r3 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000440)={0x3d, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_THREAD_EXIT(r3, 0x40046208, 0x0) preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000fffffff600000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:39 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:39 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1000) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x3) write$cgroup_type(r3, &(0x7f0000001180)='threaded\x00', 0xfc9a) fallocate(r3, 0x0, 0x0, 0x10001) fallocate(r3, 0x3, 0x5e00, 0x2cbd) fallocate(r1, 0x11, 0x401, 0x10000) sendfile(r1, r2, 0x0, 0x12000) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xfffffffffffffffc) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) [ 502.707452] binder: release 25282:25290 transaction 19 out, still active [ 502.744588] binder: unexpected work type, 4, not freed [ 502.769503] binder: undelivered TRANSACTION_COMPLETE 13:01:40 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xc1, 0x402880) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042dbd7000ffdbdf250300000004000500080001004e210000"], 0x20}}, 0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(r0, 0x5429, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') socket$nl_generic(0x10, 0x3, 0x10) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r3 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000440)={0x3d, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_THREAD_EXIT(r3, 0x40046208, 0x0) preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000000000003f004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:40 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 502.946099] audit: type=1800 audit(1543150900.032:48): pid=25304 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17887 res=0 [ 503.064905] audit: type=1804 audit(1543150900.072:49): pid=25304 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir484924990/syzkaller.7MQyh1/649/file0" dev="sda1" ino=17887 res=1 [ 503.173532] binder: release 25305:25306 transaction 22 out, still active [ 503.173612] audit: type=1804 audit(1543150900.082:50): pid=25304 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir484924990/syzkaller.7MQyh1/649/file0" dev="sda1" ino=17887 res=1 [ 503.206293] syz-executor0 (25304) used greatest stack depth: 13288 bytes left [ 503.233634] audit: type=1804 audit(1543150900.202:51): pid=25310 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir484924990/syzkaller.7MQyh1/649/file0" dev="sda1" ino=17887 res=1 [ 503.285578] audit: type=1804 audit(1543150900.232:52): pid=25304 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir484924990/syzkaller.7MQyh1/649/file0" dev="sda1" ino=17887 res=1 [ 503.298534] binder: unexpected work type, 4, not freed [ 503.348030] binder: undelivered TRANSACTION_COMPLETE 13:01:40 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000007300)=0x9, 0x4) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000000)={{0xfff, 0x8}, {0x7a8, 0x4d}, 0x4, 0x6, 0x6}) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x17) 13:01:40 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2d000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:40 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESDEC=r0, @ANYRESOCT=r0, @ANYRESDEC=r0], @ANYRES32=r0, @ANYRES32, @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRESOCT=r0, @ANYRESHEX, @ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYPTR64, @ANYBLOB="0e", @ANYBLOB="1b1b10469c8342918b0c6b6b8658916b695f5fe5b9fc3fbf252f93a19f28de5759b45c57dbbed0db12c68f3c3a0391a83cd707536fab6b8e8c73eb2de0ca373bd97e28ea8814e64370d83211f60126ab31b994fdeab71ef5f1f24c82ae4e0804b20476dfb0b3b8b46f41b2f6b642b6c41ce32e9d311bac5ede4aa4314194fe6f523c7f7a8bda3d2756cb3f3164b213a129bc94d9a45057eb8c1ab9ac9c", @ANYRESHEX=r0]], @ANYRESOCT=r0], 0x2c0) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:40 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xd00000000000000, 0x8080fffffffe) 13:01:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000700000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:40 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xc1, 0x402880) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042dbd7000ffdbdf250300000004000500080001004e210000"], 0x20}}, 0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(r0, 0x5429, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') socket$nl_generic(0x10, 0x3, 0x10) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r2 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000440)={0x3d, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) 13:01:40 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:40 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x13) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000000)=0x9000000) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) [ 503.578467] binder: release 25330:25331 transaction 25 out, still active [ 503.617900] binder: unexpected work type, 4, not freed 13:01:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000009000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:40 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xc8020000, 0x8080fffffffe) [ 503.636901] binder: undelivered TRANSACTION_COMPLETE 13:01:40 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf8f73f00, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:40 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xc1, 0x402880) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042dbd7000ffdbdf250300000004000500080001004e210000"], 0x20}}, 0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(r0, 0x5429, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') socket$nl_generic(0x10, 0x3, 0x10) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r2 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000440)={0x3d, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) [ 503.867909] binder: release 25351:25355 transaction 28 out, still active [ 503.880075] binder: unexpected work type, 4, not freed [ 503.911834] binder: undelivered TRANSACTION_COMPLETE 13:01:41 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000007300)=0x9, 0x4) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000000)={{0xfff, 0x8}, {0x7a8, 0x4d}, 0x4, 0x6, 0x6}) 13:01:41 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x1) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000080)={@multicast1, @local}, &(0x7f00000000c0)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000100)={0x0, 0x9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={r1, 0x10000}, 0x8) accept$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:41 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x300, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000074000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:41 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xf000000, 0x8080fffffffe) 13:01:41 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xc1, 0x402880) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042dbd7000ffdbdf250300000004000500080001004e210000"], 0x20}}, 0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(r0, 0x5429, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') socket$nl_generic(0x10, 0x3, 0x10) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r2 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000440)={0x3d, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) [ 504.233901] binder: release 25366:25368 transaction 31 out, still active [ 504.240800] binder: unexpected work type, 4, not freed 13:01:41 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xc1, 0x402880) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042dbd7000ffdbdf250300000004000500080001004e210000"], 0x20}}, 0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(r0, 0x5429, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') socket$nl_generic(0x10, 0x3, 0x10) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r2 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000440)={0x3d, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) [ 504.274104] binder: undelivered TRANSACTION_COMPLETE 13:01:41 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000040)='./bus\x00', &(0x7f0000000000)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) 13:01:41 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xe4ffffff, 0x8080fffffffe) 13:01:41 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x700, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00004800000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) [ 504.398243] binder: release 25380:25382 transaction 34 out, still active [ 504.419553] binder: unexpected work type, 4, not freed 13:01:41 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xc1, 0x402880) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042dbd7000ffdbdf250300000004000500080001004e210000"], 0x20}}, 0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(r0, 0x5429, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') socket$nl_generic(0x10, 0x3, 0x10) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000440)={0x3d, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) [ 504.445822] binder: undelivered TRANSACTION_COMPLETE 13:01:41 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000007300)=0x9, 0x4) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:41 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:41 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0xfffffffffffffe3a, 0x1) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0xea, 0x4) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x6}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000100)={r1, 0x7fffffff, 0x9}, 0x8) 13:01:41 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x600, 0x8080fffffffe) 13:01:41 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xc1, 0x402880) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042dbd7000ffdbdf250300000004000500080001004e210000"], 0x20}}, 0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(r0, 0x5429, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') socket$nl_generic(0x10, 0x3, 0x10) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000440)={0x3d, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) 13:01:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00004d5f53665248425f004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:42 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:42 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xc1, 0x402880) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042dbd7000ffdbdf250300000004000500080001004e210000"], 0x20}}, 0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(r0, 0x5429, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') socket$nl_generic(0x10, 0x3, 0x10) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) r2 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000440)={0x3d, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) [ 504.979975] binder: release 25403:25408 transaction 37 out, still active [ 504.989934] binder: unexpected work type, 4, not freed [ 505.007133] binder: undelivered TRANSACTION_COMPLETE 13:01:42 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='security.SMACK64\x00') ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x3, r0}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000001f00000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:42 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x6, 0x8080fffffffe) 13:01:42 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 505.190220] binder: release 25421:25423 transaction 40 out, still active [ 505.201540] binder: unexpected work type, 4, not freed [ 505.225902] binder: undelivered TRANSACTION_COMPLETE 13:01:42 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000007300)=0x9, 0x4) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:42 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xc1, 0x402880) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042dbd7000ffdbdf250300000004000500080001004e210000"], 0x20}}, 0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(r0, 0x5429, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000440)={0x3d, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) 13:01:42 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[], 0x0) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x200) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x4dc) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./bus\x00') ioctl$TIOCCBRK(r0, 0x5428) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) 13:01:42 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000004800000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:42 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000007300)=0x9, 0x4) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:42 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x400080, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) [ 505.847567] binder: release 25437:25442 transaction 43 out, still active [ 505.869646] binder: unexpected work type, 4, not freed [ 505.890120] binder: undelivered TRANSACTION_COMPLETE 13:01:43 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xc1, 0x402880) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042dbd7000ffdbdf250300000004000500080001004e210000"], 0x20}}, 0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(r0, 0x5429, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') r2 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000440)={0x3d, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) 13:01:43 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xc0000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000300000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:43 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x25c24, 0x8080fffffffe) 13:01:43 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) getxattr(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)=@known='system.advise\x00', &(0x7f0000000080)=""/94, 0x5e) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) [ 506.110723] binder: unexpected work type, 4, not freed 13:01:43 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xc1, 0x402880) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042dbd7000ffdbdf250300000004000500080001004e210000"], 0x20}}, 0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) ioctl$TIOCGSID(r0, 0x5429, 0x0) r2 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000440)={0x3d, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) 13:01:43 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x8000000000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000ffffffff004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:43 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f0000000140)={0xf9ec, 0x2}) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x212) ioctl$TCSBRKP(r0, 0x5425, 0xffffffff) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f00000000c0)={0x8000000000000000, 0xc0010aff, &(0x7f0000000000)="3e1090d570425c07741289f70ebad40355d1fa2006955f6e43bc6a6e3a3b19cccdc113aa981ea8d714d3a21f3740b41ed799916dcbb5d4b0808ee5be12", &(0x7f0000000040)="71b99b48c1526a251442271d51cce92683038308f3989822de3e8fb64b1e75946bb5508a78b0a5be02060c6380b5205153b6d99f2ed9c3c43e8207753108f2981c959d5b6ca703804a5babe223337b88aaef8f529d3a289fab7de7a773212f22e6", 0x3d, 0x61}) [ 506.278193] binder: unexpected work type, 4, not freed 13:01:43 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xc1, 0x402880) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042dbd7000ffdbdf250300000004000500080001004e210000"], 0x20}}, 0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, &(0x7f0000007d80)) r2 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000440)={0x3d, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) [ 506.492958] binder: unexpected work type, 4, not freed 13:01:43 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000007300)=0x9, 0x4) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:43 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:43 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x5808, 0x8080fffffffe) 13:01:43 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[@ANYRES16=r0, @ANYRES64=r0], 0xa) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000080)='./bus\x00', &(0x7f0000000040)="736563755d6974792e534d41434b363449504f555404", 0x0, 0x0, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000000000001f004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:43 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xc1, 0x402880) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042dbd7000ffdbdf250300000004000500080001004e210000"], 0x20}}, 0x14) r2 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000440)={0x3d, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) [ 506.759417] binder: unexpected work type, 4, not freed 13:01:43 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xc1, 0x402880) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x3d, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) 13:01:43 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000fffffdfc004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:43 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x500, 0x8080fffffffe) 13:01:43 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x7fff) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x9, 0x2, 0x7, 0x5, 0x8000, 0x7f}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) [ 506.962769] binder: unexpected work type, 4, not freed 13:01:44 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 507.050203] EXT4-fs warning (device sda1): verify_group_input:105: Cannot add at group 9 (only 16 groups) [ 507.098028] EXT4-fs warning (device sda1): verify_group_input:105: Cannot add at group 9 (only 16 groups) 13:01:44 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000007300)=0x9, 0x4) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xc1, 0x402880) r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x3d, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) 13:01:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000e82000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:44 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xff0f000000000000, 0x8080fffffffe) 13:01:44 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendto$unix(r0, &(0x7f0000000000)="d6317d9833c6f727bb712860663c2903bee2a047e2c74f396b3f2e5bfea1a5779f75f048a0", 0x25, 0x801, &(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:44 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 507.409414] binder_thread_release: 5 callbacks suppressed [ 507.409426] binder: release 25533:25536 transaction 61 out, still active [ 507.415710] binder: unexpected work type, 4, not freed 13:01:44 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000000)) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:44 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x3d, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) [ 507.479529] binder_release_work: 5 callbacks suppressed [ 507.479534] binder: undelivered TRANSACTION_COMPLETE 13:01:44 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xbf00000000000000, 0x8080fffffffe) 13:01:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000600000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) [ 507.592861] binder: release 25550:25553 transaction 64 out, still active [ 507.606011] binder: unexpected work type, 4, not freed [ 507.607551] EXT4-fs warning (device sda1): ext4_resize_fs:1917: can't read last block, resize aborted 13:01:44 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x3d, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) [ 507.643832] binder: undelivered TRANSACTION_COMPLETE [ 507.715259] EXT4-fs warning (device sda1): ext4_resize_fs:1917: can't read last block, resize aborted [ 507.767465] binder: release 25561:25566 transaction 67 out, still active [ 507.779597] binder: unexpected work type, 4, not freed [ 507.818899] binder: undelivered TRANSACTION_COMPLETE 13:01:45 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000007300)=0x9, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:45 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3000000, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:45 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)={0x5, [0x9, 0x344c, 0xfffffffffffff5ba, 0x9, 0x7]}, 0xe) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000180)="2e2f66692e65318c", 0x0, 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x11, 0x2, r1, 0x0) write$P9_RLOPEN(r0, &(0x7f0000000040)={0x18, 0xd, 0x2, {{0x1, 0x1, 0x4}, 0x401}}, 0x18) fanotify_mark(r2, 0x80, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e24, 0xffff, @mcast2, 0x1}}, 0x6a, 0x8, 0x1, 0x56, 0xd5ff}, &(0x7f0000000200)=0x98) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e22, 0xffff, @mcast2, 0xa3}}}, &(0x7f0000000300)=0x84) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000380)={r3, 0x19, 0x100000001, 0x2, 0x7f, 0x8000, 0x7, 0x1, {r4, @in6={{0xa, 0x4e22, 0x2, @empty, 0x6}}, 0x1ff, 0x20, 0x0, 0x8001, 0x2560000000}}, &(0x7f0000000480)=0xb0) 13:01:45 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x8090000, 0x8080fffffffe) 13:01:45 executing program 3: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x3d, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) 13:01:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000020004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:45 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x600, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:45 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000007300)=0x9, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:45 executing program 3: syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000440)={0x3d, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) 13:01:45 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000c0ed000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:45 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x20000, 0x8080fffffffe) 13:01:45 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) 13:01:45 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000007300)=0x9, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:45 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:45 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000080)=""/4) llistxattr(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)=""/61, 0x3d) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:45 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}) [ 508.266692] binder: 25602:25603 ioctl c0306201 0 returned -14 13:01:45 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:45 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}) 13:01:45 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xa, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:45 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xfffffff4, 0x8080fffffffe) 13:01:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00007a00000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:45 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}) 13:01:45 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)=0x0) r2 = gettid() kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000180)={r0, r0, 0xf70}) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000000)=""/203, &(0x7f0000000100)=0xcb) 13:01:45 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2d00, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:45 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = memfd_create(&(0x7f0000000040)='\'', 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000000)={0x1, 0x17b, 0x3e70, 0x3}) r2 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x82) dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000480)={0x0, 0x0, 0x0, "9ec77a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) write$P9_RSTAT(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="7d0300007d02008f007600080002000000110091801f000000ffffff7f01000087f55709ff000100000002005b5e40009ec77a8c5ae95ec8"], 0x38) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:fonts_cache_t:s0\x00', 0x23, 0x3) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:45 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x7ffffffffffff, 0x8080fffffffe) 13:01:45 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, &(0x7f00000003c0)}) 13:01:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000400000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:46 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:46 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10001b, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:46 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000000)) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x7) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) 13:01:46 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, &(0x7f00000003c0)}) 13:01:46 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x245c0200, 0x8080fffffffe) 13:01:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00001000000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:46 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, &(0x7f00000003c0)}) 13:01:46 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100013, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:46 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) perf_event_open(&(0x7f0000000080)={0x7, 0x70, 0x9, 0x8, 0x100, 0x81, 0x0, 0x6, 0x80001, 0x1, 0x7, 0x3, 0x70, 0xe6, 0x15, 0xffff, 0x8, 0x5, 0xfff, 0x6, 0x1fffc00, 0x9, 0xfffffffffffffff9, 0x80000001, 0x6, 0x9, 0x100000000, 0x6, 0x6, 0xffffffffffffff84, 0x9, 0x4, 0x81, 0x80000001, 0x7, 0x8000, 0x385, 0xffa, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x8000, 0x200, 0x3, 0xe, 0x1000, 0x3, 0x5}, r1, 0x9, r0, 0x3) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x3, 0x101200) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) getsockopt$packet_buf(r0, 0x107, 0x7, &(0x7f0000000200)=""/159, &(0x7f00000002c0)=0x9f) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x10080, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x2fc, 0x2) 13:01:46 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xff0f, 0x8080fffffffe) 13:01:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000040000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:46 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) [ 509.321530] binder: 25690:25691 got transaction with invalid offset (0, min 0 max 0) or object. [ 509.371400] binder: 25690:25691 transaction failed 29201/-22, size 0-8 line 3036 [ 509.415644] binder: undelivered TRANSACTION_ERROR: 29201 13:01:46 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:46 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './bus', [{0x20, 'security.SMACK64\x00'}], 0xa, "d20ade71ec557af1ee6bf9495228fb91d8b2f46e29d59cde0d9e704f06fbdf06e871b55de98c6d49a4edc24d831fec75818b4f16b5b74e16da2d6df532c1ddd4238556ebd07da9cf576d61904302b02549e4e736e4bcde221a83ab72bc00eaab46e18f9bc7292a24a83c7b2f2b59dcd3bb1eaabbca57cd92995167bb2a6d2c785f0c2ee5f74ba949f0309f0d168208116f3589fc5f734466cc4a310381f28dbc0203bb7935c51eb15c848052cd"}, 0xc8) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000180)={0xfffffff, 0x2, 0x8, [], &(0x7f0000000140)={0x9909d4, 0xffff, [], @string=&(0x7f0000000100)=0x2}}) 13:01:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000004000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:46 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c013, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:46 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) 13:01:46 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x1200, 0x8080fffffffe) [ 509.741251] binder: 25706:25709 got transaction with invalid offset (0, min 0 max 0) or object. [ 509.750261] binder: 25706:25709 transaction failed 29201/-22, size 0-8 line 3036 [ 509.762017] binder: undelivered TRANSACTION_ERROR: 29201 13:01:46 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) 13:01:46 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000000)={'veth1_to_bridge\x00', {0x2, 0x4e24, @rand_addr=0x1000}}) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000f5ffffff000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:46 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c01a, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:47 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x5808000000000000, 0x8080fffffffe) 13:01:47 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000200), &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) [ 509.945522] binder: 25728:25732 got transaction with invalid offset (0, min 0 max 0) or object. [ 509.961908] binder: 25728:25732 transaction failed 29201/-22, size 0-8 line 3036 [ 509.970457] binder: undelivered TRANSACTION_ERROR: 29201 [ 510.057348] binder: 25739:25742 got transaction with invalid offset (0, min 0 max 0) or object. [ 510.097499] binder: 25739:25742 transaction failed 29201/-22, size 0-8 line 3036 [ 510.145980] binder: undelivered TRANSACTION_ERROR: 29201 13:01:47 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:47 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x3f, 0x7ff, 0xc3, 0x80000001}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r0, 0xffff, 0xffffffffffffa1ef, 0x1a3c, 0xe239}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000000)=0x6571e503) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x2c, {0x2, 0x4e23, @remote}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x10}}, {0x2, 0x4e22, @broadcast}, 0x1, 0xff, 0x6, 0x3, 0x11, 0x0, 0x3, 0x8, 0x80000000}) 13:01:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000000000004c4d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:47 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c004, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:47 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xf5ffffff00000000, 0x8080fffffffe) 13:01:47 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000200), &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) [ 510.475051] binder: 25750:25758 got transaction with invalid offset (0, min 0 max 0) or object. [ 510.493741] binder: 25750:25758 transaction failed 29201/-22, size 0-8 line 3036 13:01:47 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c01d, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:47 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[@ANYRES16=r0, @ANYPTR64], 0xa) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000040)={'eql\x00', {0x2, 0x4e21}}) [ 510.525265] binder: undelivered TRANSACTION_ERROR: 29201 13:01:47 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x3f00000000000000, 0x8080fffffffe) 13:01:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000023000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:47 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000200), &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) 13:01:47 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:47 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x3d, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) [ 510.645184] binder: 25769:25771 got transaction with invalid offset (0, min 0 max 0) or object. [ 510.656777] binder: 25769:25771 transaction failed 29201/-22, size 0-8 line 3036 [ 510.666501] binder: undelivered TRANSACTION_ERROR: 29201 13:01:47 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x1000000000000000) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:47 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x104001, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000005000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:47 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x600000000000000, 0x8080fffffffe) [ 510.780135] binder: 25787:25788 got transaction with invalid offset (0, min 0 max 24) or object. [ 510.815135] binder: 25787:25788 transaction failed 29201/-22, size 24-8 line 3036 13:01:47 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:47 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x3d, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) [ 510.840711] binder: undelivered TRANSACTION_ERROR: 29201 13:01:48 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x140, 0xfffffffffffffffc) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x9, 0x3, 0x308, 0x0, 0x0, 0xf8, 0xf8, 0xf8, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, &(0x7f0000000080), {[{{@ipv6={@loopback, @loopback, [0xffffff00, 0xffffffff, 0xffffffff, 0xff000000], [0xffffffff, 0x0, 0xffffffff, 0xff0000ff], 'teql0\x00', 'dummy0\x00', {0xff}, {}, 0x3d, 0x101, 0x3, 0x4}, 0x0, 0xc8, 0xf8}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x0, 0x6, 0x1, 0x2}}}, {{@ipv6={@remote, @local, [0xffffffff, 0xffffffff, 0xffffff00], [0x0, 0x0, 0xffffffff, 0xffffffff], 'veth1_to_team\x00', 'ip6_vti0\x00', {0xff}, {0xff}, 0x0, 0x1ff, 0x1, 0x20}, 0x0, 0x118, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @common=@eui64={0x28, 'eui64\x00'}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f00000000c0)=0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f0000000100)=r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) ioctl$VIDIOC_S_HW_FREQ_SEEK(r0, 0x40305652, &(0x7f0000000000)={0x80000000, 0x5, 0xfc, 0xfffffffffffffff8, 0x3, 0x3, 0xffff}) setxattr$security_smack_transmute(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x2) 13:01:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000004004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) [ 510.915818] binder: 25805:25806 got transaction with invalid offset (0, min 0 max 24) or object. [ 510.925374] binder: 25805:25806 transaction failed 29201/-22, size 24-8 line 3036 [ 510.934907] binder: undelivered TRANSACTION_ERROR: 29201 13:01:48 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x3d, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) 13:01:48 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0xffffffffffffff9f, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) lstat(&(0x7f0000000600)='./bus\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x8, &(0x7f00000006c0)=[0xffffffffffffffff, 0xee00, 0x0, 0xee01, 0x0, 0xee00, 0xffffffffffffffff, 0xee00]) fchownat(r0, &(0x7f00000005c0)='./bus\x00', r1, r2, 0x1d00) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f0000000040)=0x1000) stat(&(0x7f0000000380)='./bus\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0}, &(0x7f0000000700)=0xc) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./bus\x00', 0x7fffffff, 0x2, &(0x7f0000000300)=[{&(0x7f0000000200)="898bbe565c4bd98bf45fa75f742789939d8075acb82e76c9f2c04b73ffe363712e213de6b2051cdd247bc98f21f84b07350c28c12c7fed17d1c29ec8adde0bd6807f02d41a7a825064aa406780fbfd02e1ba5e52b5a77e30b6c88476730d1ce9bbf8dc1dffb2c591ca32740de3c8928690563fa2004893e344b951bddcb1149e459dce3692549b6fb7ebb8a372dc5257b44774dda50956809fd81deca985fa47", 0xa0, 0x9}, {&(0x7f00000002c0)="47de2972bbe84d78561faf7f70e8674dc11b86dc01700598c9cef46f3901738a4146c052", 0x24, 0x78f}], 0x1000, &(0x7f00000004c0)={[{@quota_off='quota=off'}, {@noloccookie='noloccookie'}], [{@fowner_eq={'fowner', 0x3d, r3}}, {@subj_user={'subj_user', 0x3d, 'security.SMACK64\x00'}}, {@dont_appraise='dont_appraise'}, {@fowner_lt={'fowner<', r4}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@pcr={'pcr', 0x3d, 0x4}}, {@measure='measure'}, {@obj_type={'obj_type', 0x3d, '#&'}}, {@dont_measure='dont_measure'}]}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) futimesat(r0, &(0x7f0000000080)='./bus\x00', &(0x7f0000000100)={{}, {r5, r6/1000+10000}}) 13:01:48 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x8000000000000, 0x8080fffffffe) [ 511.013336] binder: 25814:25816 got transaction with invalid offset (0, min 0 max 24) or object. [ 511.044391] binder: 25814:25816 transaction failed 29201/-22, size 24-8 line 3036 [ 511.057584] binder: undelivered TRANSACTION_ERROR: 29201 13:01:48 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10000e, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:48 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x0, &(0x7f0000000200)=[@flat={0x73622a85}], 0x0}}], 0x0, 0x0, &(0x7f00000003c0)}) 13:01:48 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000fffffdfd4d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:48 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x200b0000, 0x8080fffffffe) [ 511.174611] binder: release 25832:25834 transaction 79 out, still active [ 511.181529] binder: undelivered TRANSACTION_COMPLETE 13:01:48 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) ioctl$sock_proto_private(r0, 0x89ef, &(0x7f0000000040)="45346447cd590e72eb99637c7e8ca3ff324ee417644a2b4474b7db9fadbe1766700b579cfde23162bb033ed8adb2871ef8a80f0c8067510fcc949fb2b5c5b948283d9b4819c32fe0439fafa9d637a8ae37d0b4697ac3561c39d475c7f2b44bd1d7428b9023dd64d0945a84541d26682908b9aedc7bf1837297cf6fe4e6d01c6f5dbbc7bcd58dfa1f0da050957b3ed3773bc88141d1c412106d04d4aad3e4f7d208edddb6edff7be03c9e5f53e1bef10f460f9bcbba89a98a22ebd21e6a321c91565c78df098dc68ad4e7948d13169e5cc3bee8f1f83a2f1089816eb369c6") setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x97) uselib(&(0x7f0000000140)='./bus\x00') setxattr$security_smack_transmute(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x2) 13:01:48 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x0, &(0x7f0000000200)=[@flat={0x73622a85}], 0x0}}], 0x0, 0x0, &(0x7f00000003c0)}) 13:01:48 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:48 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sync_file_range(r0, 0x0, 0x9, 0x2) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x1, 0x20000) 13:01:48 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x108011, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 511.324090] binder: release 25845:25847 transaction 80 out, still active [ 511.338628] binder: undelivered TRANSACTION_COMPLETE 13:01:48 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x0, &(0x7f0000000200)=[@flat={0x73622a85}], 0x0}}], 0x0, 0x0, &(0x7f00000003c0)}) 13:01:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000007fffffff000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:48 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xff010000, 0x8080fffffffe) 13:01:48 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 511.448212] binder: release 25857:25862 transaction 81 out, still active [ 511.464783] binder: undelivered TRANSACTION_COMPLETE 13:01:48 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x20) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000040)={0x9, {0x2, 0x4e21, @multicast2}, {0x2, 0x4e20, @multicast2}, {0x2, 0x4e21, @broadcast}, 0x0, 0x20, 0x7, 0x1, 0x7, &(0x7f0000000000)='gretap0\x00', 0x7, 0x67c97ddd, 0x7fffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:48 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x0, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) 13:01:48 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c012, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000074000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) [ 511.610960] binder: release 25877:25878 transaction 82 out, still active [ 511.627350] binder: undelivered TRANSACTION_COMPLETE 13:01:48 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x0, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) 13:01:48 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:48 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x8000000, 0x8080fffffffe) 13:01:48 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c015, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:48 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000100000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) [ 511.739103] binder: release 25891:25892 transaction 83 out, still active [ 511.762744] binder: undelivered TRANSACTION_COMPLETE 13:01:48 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x0, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) 13:01:48 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x2f3, 0x8000000000000000) 13:01:49 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x12, 0x8080fffffffe) 13:01:49 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, 0x0}) [ 511.889915] binder: release 25907:25911 transaction 84 out, still active [ 511.902953] binder: undelivered TRANSACTION_COMPLETE 13:01:49 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x108010, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:49 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000006c0000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:49 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000100)={r1, &(0x7f0000000040)=""/149}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) [ 511.997164] binder: release 25918:25922 transaction 85 out, still active [ 512.017152] binder: unexpected work type, 4, not freed 13:01:49 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000007300)=0x9, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 512.052852] binder: undelivered TRANSACTION_COMPLETE 13:01:49 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000003000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:49 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x108004, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:49 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000007300)=0x9, 0x4) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:49 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) memfd_create(&(0x7f0000000580)="00450c81f6927b9cf1dbfada8613cd7e2c28b3aa77594c7d79bc18b8a9ccecca3fd748d8a2c2561c974092995e95c52bce40960195fa87d579c6ad6cd3932794ad4d2c29a82edaa214c00c059be852b99154e771db331a449fbc89232bcfdcfd9ff6ea216679fe280b9b01fcaf02c81cb788ce3ca8e43943b18204c2b5cd4c7e35996e865c42d864b2d6676fbf212929ed9d5b86014fe860f0487f609e84606c28c65bd430090e", 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="75707065726469723d2e2fe6696c65302c6c6f77650100010000000000696c65302c776f726b6469723d2e2f66696c65315c00"]) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) prctl$PR_SET_SECUREBITS(0x1c, 0x21) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000001c0)={0x0, 0x0, 0x10003, 0x5}) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000480)=@assoc_value, &(0x7f00000004c0)=0x8) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f0000000400)=@in={0x2, 0x0, @remote}, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="09000000006530d56221042812139b1a6d166a21a817eee4"], 0x18, 0x80}, 0x0) r3 = gettid() perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x80000000, 0xa4e, 0x8, 0x7, 0x0, 0xe4, 0x2000, 0x9, 0x1000, 0x458, 0x8fd, 0x2, 0x2, 0x8, 0x1f72bed9c000, 0x9, 0x7, 0x200, 0x200000000000000, 0x9, 0x8, 0x4462, 0x2, 0x401, 0x131, 0x2, 0x8, 0x80000001, 0x9, 0x8, 0xc3, 0xc4, 0x7, 0x4, 0x400, 0x5bf, 0x0, 0x80000001, 0x0, @perf_config_ext={0x2a, 0x81}, 0x80, 0x8, 0x0, 0x5, 0x2, 0x4, 0x4}, r3, 0xf, r2, 0xa) stat(&(0x7f0000002480)='./file0/../file0\x00', &(0x7f00000002c0)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) rename(&(0x7f0000000280)='./file0/../file0\x00', &(0x7f0000000380)='./file0\x00') r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-intel\x00'}, 0x58) [ 512.366409] overlayfs: unrecognized mount option "lowe" or missing value 13:01:49 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xe80d000000000000, 0x8080fffffffe) 13:01:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000200000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:49 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c01e, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:49 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:49 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:49 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000007300)=0x9, 0x4) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:50 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) renameat(r0, &(0x7f00000002c0)='./bus\x00', r0, &(0x7f0000000300)='./bus\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x3, r1, 0x30, 0x0, @in6={0xa, 0x4e22, 0x3, @remote, 0x5}}}, 0xa0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[], 0xfffffffffffffe95) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) openat(r0, &(0x7f0000000180)='./bus\x00', 0x400, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.SMACK64IPOUT\x00', &(0x7f0000000080)='em0(#GPL#&[+\'lonodev}}vboxnet1mime_typeposix_acl_access\x00', 0x38, 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xffffffffffffffff) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:50 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10000d, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000010004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:50 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x900, 0x8080fffffffe) 13:01:50 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000000)="7de46c2f285765c08130739109dcefdef31eccd74edabd2a73c331df8e6fdfe839f13a1c56cf90cefea9a35cef24090cf00625280bbae8dc1166a751e34f7224d919e9d3d04981fc31dc8c302556fa", 0x4f}, {&(0x7f0000000080)="666586ddb0fde9b76dd0282e0d44c27fa71934cdd99795020b4d36a0a4a3db728188b6c16318b661973f46d8f510e211161410e45c466e13cf2a082a3272ee04993681ae6c8543f97c807397fe8ad449630cbfaf8ae7ee58fc746a1ea7a32ba87284b4cf45857819de32f9ba67", 0x6d}, {&(0x7f0000000200)="f0529cc7d3b9afb7f03ccd82d45e2675ae0f1ccca07ced8fcf4660503889715df7962b9c53e4197f6fe758fc4d282ab179b5b627921719ac1f838fedcec2541c6e11011cd5becc7e69f2b513aa3ae4ec257bb8274fe5d471e833be8269cd02199c4ab606f4c569b31383d267338b375b6ed3b7185433fe8e0ebc338c4e1b1671829cc6dc1ee1262e9446d9b8b2e2f1ccedb5ff1eb9ef6b3bd01c9bc56c6244cd54b372371aadb430d61594d47f9b49b4c1ff80828de2abac6b96963640b6a0e8e2d61df361b2194d564231eadd6a5298fe463cc518660c44401e053c3a51fd89f6b5e98512e5174ca3a2115416107c", 0xef}, {&(0x7f0000000480)="fc91a0e7efa12f49278f33633ca0b618d2bebda19b6500e7f71d23af5a8b4a8fdc1701299795274dce73364780169721c70bc4de15cdb2440b205f4a14194d9b811d7afbb8bbbabc1d955dc9414035e1f2aeb9ad9b2dc6df0b6be0586a707d8ee6fe1ace5838ee95bfdebaac086c5fe480acc75cbd96c0ff009f2ccba5bd3ba6867337d8c2b715aedc02ee9378428c3d7a6fc0b70247ebf9b2b97adef5e61539adbabac20cad19b742fd0730c65dfb150c65de3b1fdfccdaf88ba3608010a4a38e2f618d70e50f648473bcb88c83d017ce11518b8b4f085abaa04231bdc611ed9106d07318c09f", 0xe7}, {&(0x7f0000000100)="0fb6843c6bcf8fbdc2494299746574002d77bf63ef7d929982fc9c851dcbd11e98d8902353a9b5d62935e9faee66e9cc320fd6bd296cd935d7740233a447bfed2e06c071a05a74385d6f3d67c0307801e5254c1a4c19d0339007d7924e26dc0aaa339377250c4a0b056954b52f24dac4388971b3c4eab1383431c67a60c09972b834475ac31a56b9b8ca854975bc17933ce021b77c7cb02128b5eb8ddc204f38299d289c", 0xa4}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000000380)="db7293100bbaaff1ccf60e4df55d1322d0fa0a3a1be571788293c0ab9d58bc787116e0f47bdafdd09bcbf911ad0c4f63d543f5abd984dc8c278ad108e60668872c776a3970df4112456070e15b43e68f05bbbef9c6", 0x55}, {&(0x7f0000001580)="af2337177e31ba6338b766905612f58f92ed97a87fa6d00fbb45158017b400740a39b3d7f9937c270f4ee820e137d3c5f57560ac174d6fcb308e45653ef00c36bbf9ebd2aa533f2ac5a033e5017dfd9a73ee72861ab242262bf00d9478bf49794917e51c0f199edff33ebd8c43c98f0fb362c17b0b8add2f2326118a90e95504db25a65d89302b460f64c6ce6e879787fe4a9cca87d4df861f9712c5e7e435d566a9bac8da4c42644921ecbc0709a54c0c734faee24f828ca4e7f212c0e4ecd1a80e0bb1", 0xc4}], 0x8, &(0x7f0000001700)=[{0x20, 0x114, 0x200, "8ac51d38e7d78374eacb319e9aa2"}, {0x28, 0x10c, 0x2, "91ccc5c1b7dddf11614e49b57cba35d84613c88e55b6f6"}, {0x1010, 0x11f, 0x1, "3449f829d23d9de7678a1817c5c572c15416dc7268134f15b4e17a7114e7af6f489b43c00019748fde37cc94dac233349ee0d75e7ba6f5f028890c68bcff465177e8c63ce29d0141c8ac62b2f1e2678f51d554577440543c0e99bc79b8829589772d75a0000a71b3cac162cb1a11a1c77905b447eb8538f9cd1db7d1fa3b9345cb9c4d01ad936357bc35e521efd85139e09f7d78ad04ffe3bfb7a2c639ccf74438a19ae426678f80f96ea3eee4e7800744774f1850c314ebdd33cb89e47b141d5be874fe29e752dfb85c2fc5617c88e21cf1fda8e916f66989c856a62b1e0c50d9fa269e6c342060fd41d110bc407422315df6e1d6c7baf996d195a76b571f823e4682eca940f728651989f1d51b15db04accb8bea7edaf6a3e0fb2ff8b9414cbf24b2a76c79c05b6518b6bd67c0c1334cd5c3cd9109007bf7656443ff13321376b02637cf5c0238d7b88fc827b6c532583b97ea73fa1c32fc2ce5191981387a84e06841ee1dc0fa0d1d54028e39994a8aeb38af54d703042ff1d1b1b33af2d89a3ffa29a7979d8569984e46175f7a8352015746ed803db797e6fa8655d5d9cf367b136bea331fb125e5e293d4ce45b68eb2ebb1c94376a91ed862e1ac702b4996532ab2dacccf9ec90c56f19a6f0cfe725fc39aa48770820afe6b948c30ea0f7aa4ef4844b39dca4910e8eeb9f006f085ae60cf58340e6ca3628bf2fc78477ec87d6a693185a90a7b23767c997d18036f0fee91f75a74d2e489b13fb9788e60185a78da16b09c12dd7b637019c3ebdfe76175b81094897955ad2f48892c8278102be7251bdabe7c352c3eaa57c7a288c96c4b19399aaef9f0ce8270c21e49f97b50656a2711e183bc1443aade8b438c916053d1543e3275db878f69e93da8e2e5ceab38c8c867e13cfb86ab73e76f91b9719e76cf9d88c50f76010a455db1f26c183d3ae3eec10563f998ec68bc642ba58ad288ac3e6f2e4ae25e9b156957bce30353ecbb3af6416b80a47cf34d38a44e4b9a153712c59cbc80de512d2db5d79ac061712d08de2cb8f01f5b6cdd69cbaef71c9c4d44975d82ecd621bab0353f9220928737e8b508db46506fda7c808bf51795ba2d4671863e47ac5bf8ae9b73ebe40e18784a392c2e144f12bb415aab51160261f00c1a25da34228e8e2513c4d90d00e1ed31f587ba26bdeb88fe4fb3d6070dbdecd6d4554dcbd3a9027649e1ce4c58f45930c2141279bf588cd7fa4da646dc50e901078463b8443b6420d802b14308c04b149a978d9245f62aab71f4b7a99c3c42c8435e47a03f85bfa6fae541e0a96dd3d2d6607e9f3e28c10b8f0a2d0302b134ff20bd324812b26da137e90b0dcbc1a56c397d4c9fe4edd5afb4e2a81bb2a7c4be3f26323c3158b6e526d3e4497442add4982f340ac6f5b1a7b107d8f1064ef16abf7613b276753046ada046c26307cf6df6bc42657faaefff67c3f27dd15ccaad91d3e03d28fce005c617df20ca6f87fce43a93953847cb04ac0ed3af7eb39fe9cd442a9aa8db42a651d44f405e46158ed76435c222db7f951699733add5916fc9e99e94619ba64d07c173140713f4396e15079c4476d271a7ab9f0bdde504fcd02a69dc4b978d01a3712a71e21f2018514e500c7285eff4fffc06427fc1955d58eef45bddace23ac2382209eceb7170044798a854b964c612fc4518df9e30882cbc72e010f00460a040b5b936e2ac21583ddd276f3f13db12dc8495fdf20ffd8e11505dc09ce2b7e919ab054547a702ba07b22b9e8a53f2576e04582bf43e0369aa7a535150c5362991d20162cea3cb370236fab9edf329571522a194a0f463f9b419fa101951447bc4ac7456a8d97c1eefc5384b91b4a18aa14627a3601824c98a1bb71e6667580dc47ce3420abbb7e1685354af615b9ac71ffcc6bddac8aaceb5a500ce4dd8cb5d4a8b906c11441cb0479df3ab5f437e45c722fc7fb9e85b41d1f97251f401cc28e669dffd6569a89fa31bbedd775ba2ac58929a98011ff1babef1a2255b7841214d8cd6509e94a4a5c491603a863cd7260fa8a2d5cbb8eec5692445e2f4d0d9642fe10aa825314ca96de41ed599cd74158ab5237e4572bca9ae79517b2571116b4df0c521f2a35996f6fa74ad333799c7248434c919643b489e81c613ea74c3a0ab8c0eff09215b6961947e35ed617e36cc72122c760e95d71a36c825d0c80697e7d60f6daef7c7fbce8e0848ed644c92a656679ed2e4bd6e8213985dc6f0171ec8e5ed6bce3d61a7ccdac8267980e2688b539d48212167bf42938acbf275b664cb8c22f73ac1981692ebfd0b7d4ddf379c7268a628cc2d29ee5b6073796f9fdfc3b92f936829b69eeb1b4d06dea45c8d061151bb2764067cd24cc63c81a1c0bff15ca87f095a0d67fe0b23cfdd54c9aac8712abbe1fe6e9e3468f2fbd0d334989913afb6c9f526f3dcf578ccc5668874f33bceefad221167134a2fa6629b60f5400c9732ae5dd40af9aaebe75b1a710d61906086c75ffc389b52c8219f6df9d1f93e71104a997882d146e67f88b087cff5c46bad2f815e17dc41a56e3a5e11ceec85b904d8a766d3a44195f749bbeae32c8dc3f17dac75e94c1c4e952b954d663dbb9baf45d59ec520ada212b1c95775131111d1a9d1971c22103c28ebafaa744a8cb65bebfc6869e64d5d68bf1bccdb877d10c3fb9ecb4c208cfc165cc1c9a3e400c9017f94db1cff269702281afa4125eb5c8fbb9cf330baa229b37e26b21109f9636c76ef456ec036ec37982c68e0bcc81a7337b428c31d0ec961a8a8b2142658dd4bfffebeb62c3814524f4f28fbcb8583699f1546f8fd5f576cce819f7eded329245955b1b482c21797020547c997daa49852901882fc9bc0476f9c4bbe9a37e0ff2b7bf5c0d9fb8d5e5e6684097a9c043cc9395ed1b72739db505224b7a1007c90de6c3abbfbfb173f2bbe63ac740ff3fe779541154d05bccb785b1738d3e1bfc694c7437cd3c0c971dcc56c71fa6274a513711e3d56e6b19c878579f30122002b03053b08b09046199a59e676f65cb93c6a81c38290be633e30c5a3b4b196dacfcbb39a89ca38c5e97aa9546ffa5b9fabe63d035d2097846e023f29b33703572acd2d34b00b72c8a334509f3d649731949dde9e97f24af2dead5e81346cdfbf4544dfcabbaf0a0a46bf87d04e869f0f06081d28ad019cbb8db1ef2eeca4eb28fb8345b432043a6626111b1ea590308e40985fc293f1590ea938c2c549163059adf25008069e106badac2947143fc4e3d2fd8a0a3a29ccf75e21830f2d1d2a42ce31f02d2bd72fe40f41e8d727e36ff029b2ffd35e061b9179da9ca3a3a90b32924c5b903ac028fd17d5e96878c944787726910fdecfabe258dfd69755a06b82cf3e8bf3ff843d663a5d1f456fc77ccf3fbc511d174a560e8067ac18c2fcaf5181d3c16577c436b5acea2bb8d0328588486c31acd6a618ddf18eb80f821b860ad5818502240ad2aa462759b44cd448e4f0fc643966c037aba452eed4d9ca2af32d91064884d55fb3b1ea7a2a18a18da3aae4001bfb48ab106708792bc44f5f908e9ae33a27d3989ee3a8ac2054c8017ad48886866ed43dfdd45cc33c189ef3ad052fedbe92caed8096c5a1b3820120b391621b131515677214465e4d6d6d1d10e3d1bc3026724e2f36ad4a8ecab2a093e1e378e91a8b2e8cb280d157b5fb0c94597f74a466101db2a38f22564b8e4da3853254ee8cd690705ca4219802b0ba4393e31c51d9da5cfa40cf63d011e1b4a85c089d6dbb16be18c69c81c6e670341dadabe71d190261953a3edb488cd2f0add91714e6a27d80f22e0801548cc1e24c2d1fafbe80a76f8aaab6eb39f9f4903b1e56afb2691abc7f31cba15cc56ed473e7f6376ce9f71651360e3955cb2673675dbf5488e933488df4779e2edbaf7c5d6f6e7e99e6241e849b005cd9161fdefb86cbae406acf5806a122d26f57682f2c37f1cd3691e19cd13224ec0090bfc0983ae3ce75b0edcdbc3de556d61061c07608613cd6c22f1fae219c269cc3fc7c1319010a5931c32ddbd115dc3733a5eb9c173797aafd54e154addd9f76e7e6895d2ca94208a5bf1ec6fb76546b6c7bd7fba5e54a6b7c9d323e1c85fb35c7d7a49d412ded568ba6c1bb2bc3ce90fd4c3472da4c25c934db0abd5aaf63a9aa56606dc09d7f351334a3eb6fc6e27ef1980592fa24a75fa6db6a98d807708a2dd13a6962be1f8e7e3c89b86a715e40da65876f69aa5aaf469680f6dc41111124422e142049134eb74ff596b8e2170c527a88054b2f14cc4d2fe8f57820207e615137c4c9911b553ffef20013531feef4ac1ab48d0bddc24b3d699e3e0ae72f33a04d1018ac3b2406d99d41241109b5cacbb2fe29312c435b00a17fa6a81f7f77ae057b5a188d282f6d4f86a6aab7fadc239d0abdfc3b323cda6201748d46310f3520b0249dbe068f3b52b5a17109b815eb839e8d1a67d4d3834fb59c9d29d67c9d3f796dc1085f80d41f56846ac358a2d4e8886efd5e13c8c9c60868765289539dd01666533540446367bd4e3c0719a4b6eab9dd4541e55530e7476a822d2e0d4f4b9ac55f133426374bc74d09af733ae814de4c8f0ff958db36ca87ce5170228f0dd368070805c5f4bf47835e080781685fdbb007662c5118d53fd5843aa3df4328511c5005b749ce1216fd7974bd3043ad64d4795f9bfcaf89acc6fe8d19e384d7391b2cce36ecf7bc9b69df57ac8e181435164009251b2d2ac34f6d76c4ec4e3310ad7dba1586939e95f744d6eb1ef40b64d9c8b2634c3df1da86f373de0abb2f13c65c3c95f184e1032456ec9d992e5158a1e1d45ff82c0c84ea8d71aa77e673ce724b8028c2914f7d9af3734a383d0347da9a97ca7ea07240e2baf797552ef7f18979569fd6f695a71e34bd863f3f39f74e0dfe32a525b8058aedb2ff003e1417632f5df7a46407e2cdbefd9999e53ae1700fca8fc16875584d384f775adf7555fc39e59b902a86529e466f4ebc5701e82f9dc04cd0c0b209f6f6f7b25df1c620693f4c7950f4f444f6b8032c4bd4d61285c3bfbc92b456fa2e7df3a29e7aad1012f3f7cdc88667e42e154f677f6ae440d365cc04dd6dfe88ec7af07bfebc2c347e299ec06510c3e3a56669c94f64437e3fc24a07357f8906c617b3384c56c8c505f52de2624e3e052da6e2687a257fac2f942e87d36b231f0e0b76104dd64e79f4ed05eb29856d3095e4434c663ad49cff9e9eeb396410f625aa62faf83da85d5057b2b727ce2728eb9aa5d3bae229a5fdb4ab837a48f81a245465bcbb6fef5e950c048d6df7eb597694a5c8da83cc9131db04218ae419948fe7856a26d95ea8a2786f4b63e0bf09b31090f25c3357e4535a5dbe556622eed8e0dfb2ec9c7d783b54ee04a0388e0045fe00ac6948aba365bb1491ba484c6ec713d6106b877fab7198f7e5f3de7ba3f3ddf13e8aa348f9af22ed40a8ff50efb27f8571f68d3e5c47eb7b82098cb581e6e47271e44e87dc4be455efd94a509967e01a390c77b56fde457993c5578686804ad4e38bf9bbad3e55912a91ebeaf503bab0c5fd516e8ad8eddb0b8f8ff69cfe65b80428520b54ca0e0221085458bc9e0cb93f8a994b821ab9a4157ec80a083b0c9581eef3a2822602cb0ef51998be1c6f68b09eea05f0023a4a9d186b4c2c6100f1fedb1cb89140696c0ca96a8cc5e6f83f2daf5e523eecc1f3c6c2ca61b487f321cd973a1139334a42edebe62191b4bab7e6114434e15da9ea24a4eb0d412386771ef2268"}, {0xb8, 0x115, 0x3d2, "d601ec2b3a2c905b22b0a1dc4ad7ff5a678ffbb3c28c94e6926c8dc43454c0df009352384be8d6b2f51ef2611ce41d908656dea08384c52cb96ac78ee96d063aa7ef10b985da6e4dd8f47417b0c661de29a4b238e020c482c41b4f483ed636e3909de91262359a0f9d0091a43222020e19231e0a4f2a8797e18e307eee1a6b05496898e58ce7741cc380e12f7d5f893ce178b4464b0d98507dec02fee34d1d8b7b8b87753f53d5d3"}], 0x1110, 0x20000000}, 0x4000) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:50 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10401b, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:50 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x9005, 0x8080fffffffe) 13:01:50 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x2, &(0x7f0000000000)) 13:01:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000007a000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:50 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:50 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) llistxattr(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)=""/59, 0x3b) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x40002, 0x0) write$P9_RMKDIR(r0, &(0x7f00000000c0)={0x14, 0x49, 0x2, {0x58, 0x2, 0x4}}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:50 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000007300)=0x9, 0x4) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:50 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100004, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:50 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xf4ffffff, 0x8080fffffffe) 13:01:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000009000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:50 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000040)='./bus/file0\x00', &(0x7f0000000340)="73656375030000002e534d41434b363400", 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:51 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:51 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x9, 0x8080fffffffe) 13:01:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000005f42485266535f4d4d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:51 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000000)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}, 0x1}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:51 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c00a, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:51 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000000)) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x3) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:51 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:51 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000007300)=0x9, 0x4) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000074d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:51 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100014, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:51 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x9, 0x30000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x400) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0x8000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) 13:01:51 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:51 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000000)) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:52 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x58080000, 0x8080fffffffe) 13:01:52 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10801d, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:52 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000007300)=0x9, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000fffffdfc4d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:52 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x0) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) remap_file_pages(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x101, 0x0) pivot_root(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='./bus\x00') ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:52 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x104005, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:52 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000007300)=0x9, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000204d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:52 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) symlinkat(&(0x7f0000000000)='./bus\x00', r0, &(0x7f0000000040)='./bus\x00') ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:52 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x7803000000000000, 0x8080fffffffe) 13:01:52 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:52 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000007300)=0x9, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:52 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100008, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000001000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:52 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:52 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000040)=0x24) setxattr$security_selinux(0x0, 0x0, 0x0, 0x12a, 0x10000002) 13:01:52 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x235c0200, 0x8080fffffffe) 13:01:52 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c008, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:52 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./bus\x00', r0}, 0x10) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000060000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:52 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:52 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0xfff0, 0x8080fffffffe) 13:01:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000fcfdffff000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:53 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10002d, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:53 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x10000, 0x21) 13:01:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:53 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:53 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x640, 0x8080fffffffe) 13:01:53 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c01b, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:53 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000000)=0xffffffffffffff91) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:53 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x10000000000000, 0x8080fffffffe) 13:01:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000014d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:53 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) getsockopt$nfc_llcp(r0, 0x118, 0x7, &(0x7f0000000480)=""/4096, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r0, 0x0, 0x6, &(0x7f0000000080)='proc+\x00'}, 0x30) perf_event_open(&(0x7f0000000140)={0x4, 0x70, 0x9, 0x5, 0x6, 0x5, 0x0, 0x5, 0x2000, 0x1, 0x8, 0x200, 0xcb, 0xffffffff, 0x5, 0x40, 0x100000000, 0x1e, 0x0, 0x3, 0xffffffffffff0001, 0x4, 0x42, 0x181, 0xfffffffffffffffe, 0x5, 0x5, 0x1, 0x100, 0xb7f, 0x4, 0x80000000, 0x80000000, 0x1, 0x1, 0xd8, 0x3033, 0x1, 0x0, 0xc0, 0x1, @perf_bp={&(0x7f0000000100), 0xf}, 0x0, 0x5, 0xfb, 0x0, 0x200, 0x39b2, 0x6}, r1, 0xb, r0, 0x3) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x8, 0x7, 0x7ff, 0x9f, 0x0, 0x2673, 0x88, 0xe, 0x6, 0x8, 0x9a, 0x0, 0x110b, 0x1ff, 0x8000, 0x4, 0x7, 0x77, 0x8000, 0x4, 0x7000000000000000, 0x3, 0x5, 0x3, 0x200, 0x9, 0x6, 0x8, 0xfff, 0x6, 0x8, 0x8bd, 0x4, 0x6, 0x2, 0x9a3, 0x0, 0x10000, 0x4, @perf_config_ext={0x2, 0x1}, 0x8800, 0x9, 0x0, 0x2, 0x8000, 0x7, 0x101}, r1, 0x9, r0, 0x2) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x13f, 0x1}}, 0x20) 13:01:53 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100016, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:53 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c7) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) lstat(&(0x7f0000000480)='./bus\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./bus\x00', 0xffffffff, 0x6, &(0x7f0000000380)=[{&(0x7f00000000c0)="d00556f355a2e16dd359200605e40e412837e130d9c0e31600064ca13dfa74d146dc7ba187e8c441d8c0962dc6feaf7e12fa7a8e3b04a9eb03c37c3c612588b28bebe260618ed766e665e60105de11d6b8", 0x51, 0x100000000}, {&(0x7f0000000140)="87eb620b98e935a5bc31b98974f6c6ab9a6c3a0ddc6d2c", 0x17, 0x4}, {&(0x7f0000000200)="cbffa1f1a21a391980b8af54ccbbbc80839c67eb0ec53ae79b728fc4a56fd1e992ef01e2f2069e9c207390f958bac151b2f5a3d285ff6037bc36f8922838d8ea9a1ecc247bc2f3d80f61afe862970964912783a86e67e6881a9d4a364474cffdd8389979b97c887c775ddcb68d7b2b005e1349eb38eb0dc37a596760b452985636025811f62b3b03a1874d2bd03c84aac9f83d26c32d7aba", 0x98, 0x8}, {&(0x7f0000000180)="952cd4e0542fc900317328419a", 0xd, 0x4}, {&(0x7f00000002c0)="4cad66a0912b089b6c3e4b4419634aa52b388fd34baa500d0664d0e00b56", 0x1e, 0x800}, {&(0x7f0000000300)="80ad6c6c6c88db27b868d306b58b1b5bcef88f8f3cce477ebf5fc502a012c08dad9237ca2542bb0388", 0x29, 0xffffffffffffffe5}], 0x21800, &(0x7f0000000540)={[{@replayonly='replayonly'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@commit={'commit', 0x3d, 0x9}}, {@usrquota='usrquota'}, {@balloc_noborder='block-allocator=noborder'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@tails_on='tails=on'}, {@balloc_border='block-allocator=border'}, {@data_journal='data=journal'}, {@errors_continue='errors=continue'}], [{@euid_lt={'euid<', r1}}]}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) mbind(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2, &(0x7f0000000000)=0xfd24, 0x7fffffff, 0x3) semget(0x2, 0x1, 0x420) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:53 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000), 0x808000000002) 13:01:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000024d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:54 executing program 3: r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:54 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0xfffffffffffffdbe, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 13:01:54 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x104003, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:54 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000034d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:54 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x2) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000080)={0x0, 0x7, 0x1b00, &(0x7f0000000040)=0x7}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) pwrite64(r0, &(0x7f00000000c0)="5562242e002232d2cb1a3e5da37f3d8cbd6129020c947fbb2583d4aecf53016e2a7f97a05844c9245bd5dffeb8b74876090ec51d041c40c6c5ec50a78b4c1e", 0x3f, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@timestamp], 0x1) 13:01:54 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c011, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:54 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[], 0x0) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x100000000}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={r1, 0x3}, &(0x7f0000000100)=0x8) syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x5, 0xc0200) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000000)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:54 executing program 3: r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000230000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:54 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffff0) 13:01:54 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000007a0000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:54 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x104017, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:54 executing program 3: r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:54 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:54 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:54 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000040)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000000140)=0xe8) r2 = getgid() lchown(&(0x7f0000000000)='./bus\x00', r1, r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000180)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000240)={0x0, 0x0, 0x9}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000280)={r3, r4}) lsetxattr$security_smack_entry(&(0x7f0000000200)='./bus\x00', &(0x7f0000000480)="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", 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000fffffff54d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:54 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x104014, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:55 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000000)=""/161) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:55 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:55 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000), 0x808000000010) 13:01:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000ffffff8c4d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:55 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x104012, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:55 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:55 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) memfd_create(&(0x7f0000000000)='wlan0trusted\x00', 0x2) ioctl$KVM_RUN(r0, 0xae80, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:55 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:55 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:55 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:55 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10801e, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:55 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000ffffff8c000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:55 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:56 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000), 0x8080ffff0010) 13:01:56 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x55a, 0x2) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x3) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000040)={0x7fff, 0xffffffff00000000, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000080)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 13:01:56 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x104002, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:56 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x3, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000048000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:56 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:56 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000040)={{0x80000000, 0x8001}, {0x1, 0x1f}, 0x8, 0x4, 0x6}) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000068000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:56 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10400b, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:56 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x88) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000040)={0x9, 0x0, 0x0, 0x8}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000080)={0x2, r1, 0x1, 0x100000000}) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f00000000c0)=""/209) 13:01:56 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:57 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0x8) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) [ 519.989073] EXT4-fs warning (device sda1): ext4_group_extend:1762: can't shrink FS - resize aborted [ 520.039103] EXT4-fs warning (device sda1): ext4_group_extend:1762: can't shrink FS - resize aborted 13:01:57 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000), 0x8080ffffff10) 13:01:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000c0ed0000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:57 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10401d, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:57 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:57 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x27, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:57 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}], 0x2, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:57 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) execveat(r0, &(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000240)=[&(0x7f0000000040)='systemem0eth0ppp1.%selinuxcgroup{md5sum%security\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f00000000c0)='^\\\x00', &(0x7f0000000100)='\x00', &(0x7f0000000140)='self:.#\x00', &(0x7f0000000180)='keyring\x00', &(0x7f0000000200)='-cgroup.\x00'], &(0x7f0000000280), 0x100) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:57 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x108012, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000fffffdfd000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:57 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000000)={0x7ff, 0x29e1}) write$P9_RFLUSH(r0, &(0x7f0000000040)={0x7, 0x6d, 0x2}, 0x7) setxattr$security_selinux(0x0, 0x0, 0x0, 0xffffffffffffff8f, 0x7ffffffffffffffc) 13:01:57 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10001d, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000fffffff64d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:58 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x280080) faccessat(r0, &(0x7f00000001c0)='./bus\x00', 0x28, 0x200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/netfilter\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000080)={0x8, 0x3, 0x8001, 0x5, 0x40, 0x3, 0x27, 0xff, 0x0}, &(0x7f00000000c0)=0x20) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000140)={r2, 0x3}, 0x8) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) socketpair(0x1b, 0x80800, 0x20, &(0x7f0000000200)) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) 13:01:58 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)=0x0) r2 = getegid() fchownat(r0, &(0x7f0000000040)='./bus\x00', r1, r2, 0x1800) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x62, 0x0) 13:01:58 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10400d, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000234d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:58 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{0x0, 0x0, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x3, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:58 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:58 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) semget(0x2, 0x80cd687112f267e8, 0x424) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x4e20, @broadcast}]}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={r1, 0x101, 0x6, 0x1, 0x400, 0x3}, 0x14) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:58 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c01f, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000023000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:58 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:58 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x3, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x61be) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) write$P9_RREADDIR(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x85) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000040)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}) 13:01:58 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x104013, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:59 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x14c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) 13:01:59 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1f, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[], 0x2b9) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000040)={'mangle\x00', 0x8e, "10a6c00351210cb33ebb364625749bf6b3f4eef21e710cb57899d359d9fa376794452417d067a483a39b230f0ac942a48762225cab349a7676c02afbaef442126f27945e9c95b4114f8ec7202d296aa48085b777d5d9d3c1017757446fd3d36bc2357070d62a4c87607da6afb168a67fcd1c9334afa39d704e3b44be2f3dafb8e7f8b1f279c59db9b3f7e8840f1a"}, &(0x7f0000000100)=0xb2) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000140)) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000180)='security.SMACK64\x00', 0x0, 0x155, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:59 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000004c000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:59 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x108016, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:59 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, 0x0, 0x0, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x3, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:59 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x23) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) 13:01:59 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x108017, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:01:59 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) connect$l2tp(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x0, 0x1, 0x0, {0xa, 0x4e23, 0x101, @mcast1, 0x200000000}}}, 0x32) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000404d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:01:59 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:01:59 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000040)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f0000000000)=[{}, {}], 0x0, [{}]}, 0x88) fsync(r0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:01:59 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c007, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000003f000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:00 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT=r2, @ANYRES16=r1, @ANYBLOB="d7d6aa7db5e2f6342ccb1ac13031a13574e219e0d332cdd33d481328aea4bbf464df856be0a8ca238a61cf5c12955c71c786", @ANYRES64=r0, @ANYRESDEC], 0x67) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, 0x20002000000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0xfffffffffffffd7a, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x6) lsetxattr$trusted_overlay_origin(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000000c0)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:02:00 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x108018, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:00 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./bus\x00', 0x2, 0x6, &(0x7f0000000380)=[{&(0x7f0000000080)="57885696f6645028d930c5fc79447ee1e84dfa63be09f57f4e62e6bc1fa5439e46bfb7e6bee78c", 0x27, 0x9}, {&(0x7f00000000c0)="ca355fc62f5bcabe57010ba6fcb9a251501d5fb4eef282f299de48233fa93c88b0828fb0f650e9f94cde47252b1760f71b814c69052a4aff680df866d2480a32c511d085e2a0a3542bae548849397453ccdf0ab38168b4776dd4899afccc18d84826fe", 0x63, 0x500000000}, {&(0x7f0000000140)="be043dc19ff6d8a6208777bae342f09a04f2", 0x12, 0x6}, {&(0x7f0000000200)="9e8f09adb9ea53fa2b1c720a8e36d3862898401e967effaf06aaac0b451e0d93f4d40f899b3e6093a2f6384da4256804e9e9529e1655172fd141618d37ea48a763ca3718bda1c2da2661c2ed22161f2506acddebb4b9e26cea7c6fba59e1940289fcd559be4b67585439a18efe8afb1985396fd1e5be0a1d38f05eca9b0c3a1ec983300d8a13fa70cfb0ffb35f096715222df6f5d51e962022c7d6bf8fc531b10a55bf178e30", 0xa6, 0x2}, {&(0x7f0000000180)="7fb9e6a660cca0afa37d7295bb8bae7819a55ec84b73ca94d4e41b9960b7", 0x1e, 0x1000}, {&(0x7f00000002c0)="a9aa697b703487024f577e4cb4a9c24690ae3076cfa7f3dc771ac0403ea70d32a95cdc34fae978e794600c3d2b009293d908832c9de35ba357d2c2c3b5a5268cce5e9f24b2d4eb72f4cdfa009c730f1e83f7d4a2c824d4fd7eed27d0a805b3eb06a5", 0x62, 0x8}], 0x200810, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)=@hci, 0x80, &(0x7f0000000580)=[{&(0x7f0000000500)=""/88, 0x58}], 0x1, 0x0, 0x0, 0x401}, 0x10000) 13:02:00 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}], 0x5, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x3, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:00 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x800, 0x8080fffffffe) 13:02:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000e820000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:00 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:00 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10000a, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:00 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:02:00 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c019, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:00 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100), 0x10) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000040)=0x8) 13:02:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000400000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:00 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000000)=0x9, 0x4) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) 13:02:00 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa, 0x4e21, 0x7, @mcast2, 0x1d3}}}, 0x88) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:02:01 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10800e, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:01 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x3, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:01 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x5, 0x0, 0x0, 0x840000, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) setxattr$security_smack_transmute(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x1) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) 13:02:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000c0ed00004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:01 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:01 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x100000001) lsetxattr$security_smack_entry(&(0x7f0000000000)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:02:01 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100017, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000010000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:01 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000000)=r0) write$P9_RLOCK(r0, &(0x7f0000000040)={0x8, 0x35, 0x1}, 0x8) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:02:01 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10400c, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:01 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x104, 0xffffffffffffffb1) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:02:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000004c0000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:01 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:02 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}], 0x3, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x3, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:02 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x9, 0x0, 0x2, 0xc3e, 'syz0\x00', 0x65}, 0x4, 0x24, 0x4, r1, 0x4, 0xffffffffffff9184, 'syz0\x00', &(0x7f0000000040)=['security.SMACK64\x00', '%]\x00', 'security.SMACK64\x00', 'security.SMACK64\x00'], 0x36, [], [0x2000000000, 0x3ff, 0x100000001, 0x6]}) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:02:02 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c017, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000064d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:02 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000)=0x3, 0x8080fffffffe) 13:02:02 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:02 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) r1 = accept$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000080)={0x5, 0x10, 0xfa00, {&(0x7f0000000480), r2}}, 0x18) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:02:02 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c00d, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000074000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:02 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:02 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000480)=""/4096) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'U-', 0x81}, 0x28, 0x1) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000080)={0xfff, 0x2, 0x1, 0x890, 0xfffffffffffffffe, 0x4, 0xa}) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = fcntl$getown(r0, 0x9) r2 = syz_open_procfs(r1, &(0x7f0000000000)='net/bnep\x00') ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000040)=r0) 13:02:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000004000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:02 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {0x0}], 0x4, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x3, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:02 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10800b, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:02 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)=0x0) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x2e, 0x200, 0x200, 0x1, 0x0, 0x10001, 0x40000, 0x8, 0xaf6e, 0x1, 0x75f1, 0x8, 0x1ff, 0x6c, 0x1, 0x8001, 0x3, 0x8001, 0x6, 0xf800000, 0x8001, 0x9, 0x7, 0x9, 0x3b, 0x7ff, 0xfffffffffffffff7, 0x8001, 0x100000000, 0x5, 0x800, 0xa7, 0x0, 0x8, 0xfffffffffffff801, 0x100000001, 0x0, 0x800, 0x4, @perf_config_ext={0xe14, 0xfffffffffffffffa}, 0x4, 0x3, 0x100, 0xf, 0x34, 0x7, 0x5}, r1, 0x5, r0, 0x1) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) r2 = geteuid() mount$9p_xen(&(0x7f0000000100)="2c6e6f6465767d5d73797374656d276d696d655f7479706573797374656dc1706f7369785f61636c5f61636365737300", &(0x7f0000000140)='./bus\x00', &(0x7f0000000180)='9p\x00', 0x1000, &(0x7f0000000200)={'trans=xen,', {[{@debug={'debug', 0x3d, 0x4}}, {@mmap='mmap'}, {@nodevmap='nodevmap'}, {@access_any='access=any'}, {@aname={'aname', 0x3d, 'security.SMACK64\x00'}}, {@nodevmap='nodevmap'}], [{@uid_gt={'uid>', r2}}, {@dont_hash='dont_hash'}]}}) listen(r0, 0x1ff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f00000000c0)={0x3, 0x9, 0x9, 0x0, 0xfffffffffffffe01, 0x80000000}) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:02:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000003000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:03 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000040)={0x9, 0x10, [0x1, 0x7f, 0x1, 0x3]}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) 13:02:03 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000), &(0x7f0000000040)=0x4) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:02:03 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:03 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10400a, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000050000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:03 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10800c, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:03 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000003c0)={'team0\x00'}) r1 = open(&(0x7f0000000300)='./bus\x00', 0x101000, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000380)) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000180)='./bus\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_tcp(&(0x7f0000000080)='127.0.0.1\x00', &(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='9p\x00', 0x1b8b3d6a14121cbc, &(0x7f0000000480)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@afid={'afid', 0x3d, 0xfff}}, {@debug={'debug', 0x3d, 0x1}}, {@noextend='noextend'}], [{@uid_lt={'uid<', r2}}, {@context={'context', 0x3d, 'root'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@smackfstransmute={'smackfstransmute'}}, {@permit_directio='permit_directio'}, {@measure='measure'}, {@euid_lt={'euid<', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'security.SMACK64\x00'}}]}}) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x40) ioctl$KDDISABIO(r4, 0x4b37) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:02:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000e82000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) [ 526.482495] audit: type=1804 audit(1543150923.562:53): pid=26736 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir484924990/syzkaller.7MQyh1/738/bus" dev="sda1" ino=16545 res=1 [ 526.619512] audit: type=1804 audit(1543150923.602:54): pid=26736 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir484924990/syzkaller.7MQyh1/738/bus" dev="sda1" ino=16545 res=1 [ 526.763499] audit: type=1804 audit(1543150923.612:55): pid=26736 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir484924990/syzkaller.7MQyh1/738/bus" dev="sda1" ino=16545 res=1 [ 526.787250] audit: type=1804 audit(1543150923.622:56): pid=26740 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir484924990/syzkaller.7MQyh1/738/bus" dev="sda1" ino=16545 res=1 13:02:04 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x3, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x3, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:04 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10801c, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000fffffdfc000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:04 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) getpeername(r0, &(0x7f0000000000)=@can={0x1d, 0x0}, &(0x7f0000000080)=0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', r1}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000140)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x47, 0x10000000000002) 13:02:04 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000040)={0x0, @data}) 13:02:04 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:04 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x104000, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:04 executing program 0: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x100, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040), 0x4) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) getuid() 13:02:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000740000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:04 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x374, 0x9, 0x5, 0x7, 0x0, 0x4b, 0x10, 0xc, 0x72, 0x8a, 0x4, 0xffffffffffffff01, 0x7fff, 0xe07, 0x6, 0x5, 0x7ff, 0x1, 0x40, 0x8, 0x53, 0x3ff, 0x7, 0x80000000, 0x10001, 0x4, 0xffffffffffffff00, 0x20, 0x6, 0x3ff, 0xfffffffffffffffa, 0x1, 0x80, 0x4, 0x7, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0xf27, 0x7}, 0x0, 0xf489, 0x80, 0xf, 0x10001, 0x10001, 0xfffffffffffffffa}, r1, 0x2, r0, 0x8) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:02:04 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x108019, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000480000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:05 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {0x0}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x3, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:05 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0xfffffffffffffe02, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x110}, {r0}, {r0, 0x84}, {r0}], 0x4, &(0x7f00000000c0), &(0x7f0000000100)={0x2}, 0x8) 13:02:05 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10801f, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000006000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:05 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0xffffff0d, 0x0, 0xfffffffffffffffa, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x408000, 0x200000000000) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'mangle\x00'}, &(0x7f00000000c0)=0x54) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) 13:02:05 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000000000003f4d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:05 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bcsf0\x00', &(0x7f0000000000)=@ethtool_cmd={0x0, 0x100, 0x4, 0x5a, 0x2, 0x3, 0xf2, 0x9, 0x9, 0xfffffffffffff800, 0x0, 0x7, 0xfffffffffffffffc, 0x8, 0x5f, 0x20, [0x5, 0xffffffffffffffe3]}}) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xc4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:02:05 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10001c, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:05 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:05 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x6aa, 0xc00) getpeername$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) utime(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x1c3, 0x2}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000040)=0x202001) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r1, r0, &(0x7f0000000200), 0x6) 13:02:05 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) rename(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='./bus\x00') getsockopt$inet6_buf(r0, 0x29, 0xd2, &(0x7f0000000480)=""/4096, &(0x7f0000000080)=0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x8005) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x58, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0x2, @mcast1, 0x200}, @in={0x2, 0x4e24}, @in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e22, 0x7ff, @mcast2, 0x38e}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000200)={r1, 0x9, 0x8, 0x5, 0x6, 0x9}, &(0x7f0000000240)=0x14) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:02:05 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {0x0}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x3, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:05 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000002000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:05 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x104019, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:05 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) renameat2(r1, &(0x7f0000000180)='./bus\x00', r1, &(0x7f00000001c0)='./bus\x00', 0x2) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000040)=""/181) 13:02:05 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./bus\x00', r0, &(0x7f0000000040)='./bus\x00') 13:02:06 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x3, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:06 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) unlinkat(r0, &(0x7f0000000000)='./bus\x00', 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0xfffffffffffffff0, 0x0) 13:02:06 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100019, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000090000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:06 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400000000001) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x5}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)={r1, 0x6}, &(0x7f00000000c0)=0x8) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:02:06 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100025, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:06 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x3, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x3, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000fff0000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:06 executing program 0: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x3, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:06 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c00c, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:06 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000080)=&(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x5, {0x1, 0x1, 0x219, 0x100000000, 0x80, 0x534}}) 13:02:06 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{0x0, 0x0, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:07 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10000c, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000007a000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000007000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:07 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100018, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:07 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x104015, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000030000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:07 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {0x0}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x3, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:07 executing program 0: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x3, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:07 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x100000000000009, 0x1ef, 0x0, 0x20810, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x40000, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x141240) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x400, 0x401, 0x8000, 0x3, 0x7fff, 0x7f, 0x7, {0x0, @in6={{0xa, 0x4e21, 0x80000001, @mcast1, 0x4}}, 0x7, 0xd8, 0xfffffffffffffffe, 0x20, 0x9}}, &(0x7f00000000c0)=0xb0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000200)={r3, @in={{0x2, 0x4e23, @multicast1}}, 0x1000, 0x101, 0x9, 0x4, 0x4}, &(0x7f00000002c0)=0x98) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) 13:02:07 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:08 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x442) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0x1, 0x80000000, 0x200, 0x5}, 0x8) r1 = openat(r0, &(0x7f0000000140)='./bus\x00', 0x2000, 0x20) dup3(r1, r0, 0x80000) accept4$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14, 0x800) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'ip6_vti0\x00', r2}) setsockopt$inet6_dccp_int(r1, 0x21, 0x5, &(0x7f0000000240)=0x8000, 0x4) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000080)=0x5c4, 0x4) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f00000000c0)={0x6, 0x5}) 13:02:08 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x104018, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000820e0000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000400000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:08 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x104009, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000006c000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:08 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100002, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:08 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x3, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x3, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:08 executing program 0: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x3, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000484d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:09 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x104007, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:09 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x1) 13:02:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000068000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:09 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x108003, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000001004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:09 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}], 0x4, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:09 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10801a, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:09 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{0x0}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x3, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000edc0000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:09 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10001e, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:09 executing program 0: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x3, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x3, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:10 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x8) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='pipefs\x00', 0x8000, &(0x7f0000000140)=',@posix_acl_access\x00') r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f00000001c0)={0x1, "f54e5e319ab1dbf0c49a854e1870c2d5231e205633cd7fa00e2b22d037c5c2f4", 0x3, 0x1}) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 13:02:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000002000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:10 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100009, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000005000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:10 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100012, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:10 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {0x0}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000009000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:10 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c01c, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:10 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, 0x0, 0x0, 0x2}}], 0x3, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:10 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 533.846979] audit: type=1804 audit(1543150930.932:57): pid=27049 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir269318714/syzkaller.UAW80u/602/bus" dev="sda1" ino=16573 res=1 13:02:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000010000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) [ 533.970538] audit: type=1804 audit(1543150930.972:58): pid=27023 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir269318714/syzkaller.UAW80u/602/bus" dev="sda1" ino=16573 res=1 13:02:11 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x26d) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) 13:02:11 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100010, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000006000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:11 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10401a, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000001f0000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:11 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x104004, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:11 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x4, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:11 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a}}], 0x3, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:11 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000070000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:11 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c016, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000008cffffff000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:12 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0x80, &(0x7f0000001340)=""/149, &(0x7f0000001400)=0xfffffce8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000140)={0x0, 0x1000, "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"}, &(0x7f0000000040)=0x1008) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000080)={r1, 0xffffffffffffff81}, 0x8) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) 13:02:12 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10001a, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000054d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:12 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000fdfdffff000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:12 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:12 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x104010, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:12 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x2, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000007fffffff4d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:13 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c009, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000000000000fff4d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:13 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x28000, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000080)=""/33) syz_mount_image$vfat(0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x50, r1, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 13:02:13 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c010, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 536.316626] QAT: Invalid ioctl 13:02:13 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x4, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000044d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:13 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x108014, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:13 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{0x0, 0x0, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x2, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:13 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000744d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:13 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:13 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100005, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000000000000e824d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:14 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 537.101746] QAT: Invalid ioctl 13:02:14 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x197, 0x0, 0x800000, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000280)) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x6, 0x0, 0x1, 0x8, 0x0, 0x1, 0x9, {0x0, @in6={{0xa, 0x4e21, 0x7, @empty, 0x7ff}}, 0x7, 0x0, 0x10001, 0x0, 0x5}}, &(0x7f0000000200)=0xb0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000240)={r1}, 0x8) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) getpeername(r0, &(0x7f0000000040)=@ax25, &(0x7f00000000c0)=0x80) 13:02:14 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c000, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000094d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:14 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:14 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:14 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{0x0, 0x0, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x2, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:14 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x3, 0x0) mknodat(r0, &(0x7f0000000080)='./bus\x00', 0x1100, 0xfffffffe) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f00000000c0)={0x1, r0, 0x1}) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 13:02:14 executing program 0: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:14 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c018, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000040004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:14 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100011, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000004c000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:15 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x104006, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x4, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:15 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003a00)=@can, 0x80, 0x0, 0x0, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x2, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000020000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:15 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x6, 0x8000) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 13:02:15 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c005, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:15 executing program 0: r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000003f0000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:15 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c00e, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000004d5f53665248425f4d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:15 executing program 0: r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:16 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x108015, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {0x0}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000804d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:16 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}], 0x3, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x2, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:16 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x104011, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:16 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0xffffffffffffff32) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x1000, "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"}, &(0x7f0000001180)=0x1024) io_setup(0x9, &(0x7f00000011c0)=0x0) io_cancel(r1, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x8, 0x7b, r0, &(0x7f0000001200), 0x0, 0x9, 0x0, 0x2, r0}, &(0x7f0000001280)) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000040)={0x1, {{0xa, 0x4e21, 0x401, @mcast2, 0x10001}}}, 0x88) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001200)='/dev/video36\x00', 0x2, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/vga_arbiter\x00', 0x80000, 0x0) 13:02:16 executing program 0: r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000048000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:16 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10801b, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000fffffff6000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:16 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:16 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000040)) eventfd2(0x100, 0x80800) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) 13:02:16 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}], 0x3, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x2, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:17 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x4, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:17 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10003b, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000ffffffff4d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:17 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)=@known='trusted.overlay.opaque\x00', &(0x7f00000000c0)='\x00', 0x1, 0x2e723372c1e7a650) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0xfffffffffffffff5) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffa) 13:02:17 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:17 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYRESOCT=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRES16=r0, @ANYRES16=r0, @ANYRESDEC=0x0, @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRESHEX=r0, @ANYRESHEX=r0]], 0x53) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) 13:02:17 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x108009, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000001f000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:17 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:17 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10401f, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000fffffff5000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:17 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {0x0}], 0x4, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x2, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:18 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{0x0}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000004000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:18 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10401c, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:18 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000680000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:18 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x40, 0x0) ioctl$VIDIOC_ENUMAUDIO(r0, 0xc0345641, &(0x7f0000000080)={0x200, "a7c755de0558ef15a7da24094d6aa37a6ec5a0e37cfaded119f3835947cc550f", 0x1, 0x1}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) 13:02:18 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x104008, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:18 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000000000006c4d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:18 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x108007, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000000000001f4d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:18 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x3, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x2, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:18 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:18 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10401e, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:18 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000007000000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:19 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c003, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:19 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) getresuid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000240)='./bus\x00', 0x7ff, 0x3, &(0x7f0000000480)=[{&(0x7f0000000280)="47a1ee9e68f8b24dc8341b37ba305d310537659e8a4bcd0bbd8d798bb437f12e1eddcf20bf2ca197876edd7cb4be99ed83a0de8440a84c88e9917aa074701008c1a0a2781450b5fb4ddff29be95b07b6b72a942f2d9443f5e049ec836dd3abf43bb87e5e8ffed081438d587c30a3806fc63aa7ed54ebb9c420f8ff9394a235fac3e8", 0x82, 0x1}, {&(0x7f0000000340)="cf858102", 0x4, 0x6}, {&(0x7f0000000380)="9083feb3695b0628698046af769038de83ab6a862726802d96c56b1ce8977be1710baba5b4f9fea33e1d4daf392b196385f456d92266247b950b7070e2e211fc8ee12eedf40949e109bc73aa77b48aa1923235e900245832057c7dc9be2dddcdfd54960b81d8240e380fa6826fb80865e8011a6da01b13b5eabe5d46aea62887765107eed2a6db1fb07964effc7e086c83a7a2f2183c7e88ab4c42a61d12d6ba1bd104b7b0dab049f5033e4efa91afad5d10a79e3456a24d60f5591febaea7083b9be9628047f68da3e5f3645bcb8ed1723a779978cf1f3df3f2ea7966b35b610517", 0xe2, 0xff}], 0x800, &(0x7f00000005c0)=ANY=[@ANYBLOB='noacl,fault_injection=0x0000000000000006,noacl,user_xattr,acl,acl,user_xattr,measure,fscontext=sysadm_u,obj_role=GPL+,euid=', @ANYRESDEC=r1, @ANYBLOB="2c646f6e745f686173682c6673636f6e746578743d73797361646d5f752c7063723d3030303030303030301d303030303030303035322c66756e633d4d4f44554c455f434845434b2c6673636f6e746578743d757365725f752c00"]) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f00000006c0), &(0x7f0000000700)=0x30) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000040)="980bb5eef4f8ebfa11d8161852416c794f7fb50d0e0eced8d0ff52ab6c10d3", &(0x7f0000000140)="0ee3ec0665c38699ac84fa179a07fb985ca514643c420ce35583eed550708416ce7277a2e2a6883d02f9ffe43f1b21f501e7c991ac12663e97c6e0dd4e5ee0f0fe194317421d14c490f44703a4c09305ecfd3b0da6dcebcf156d491004b599170b3277d44e1c75bd9d92e569a088426479f5a27401c8fa4665140ed2a278087b90882775dbe6dfccfb3bc51df66316902c7c20c358c1a90ad05484f5837319db68366b19c270dddc36c4aa042dcbe83ddfe24627e7d581945e9cf5d554fd0b08a98dfdfbda8888879b54bc5e329730cb8cd59362929093ff5317b45a0bf94b3ce5be01420894c2a3", 0x2}, 0x20) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) 13:02:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000001000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:19 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x3, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x2, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:19 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 542.325295] erofs: read_super, device -> /dev/loop4 [ 542.343479] erofs: options -> noacl,fault_injection=0x0000000000000006,noacl,user_xattr,acl,acl,user_xattr,measure,fscontext=sysadm_u,obj_role=GPL+,euid=00000000000000000000,dont_hash,fscontext=sysadm_u,pcr=0000000000000000052,func=MODULE_CHECK,fscontex 13:02:19 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10800a, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 542.384102] erofs: cannot read erofs superblock 13:02:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000f6ffffff000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:19 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1ff, 0x3, 0x9, 0x9, 0x1, 0xff, 0x8}, 0x1c) 13:02:19 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:19 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c014, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000ffffffffffffffff4d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:19 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) fsync(r0) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) 13:02:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000006c000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:20 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x108006, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:20 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:20 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {0x0}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x2, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000fff000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:20 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x108008, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000684d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:20 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c00f, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x3, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000000000007a4d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:21 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x4700c2, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x2142, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x2c8) write$FUSE_WRITE(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffffe, 0x7, {0x9f}}, 0x18) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) 13:02:21 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:21 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10000b, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000030000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:21 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x3, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x2, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:21 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10800d, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000100000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:21 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:21 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10800f, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000e8200000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:21 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{0x0, 0x0, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:22 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) link(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='./bus\x00') 13:02:22 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x108005, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000008cffffff0000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:22 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100003, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:22 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {0x0}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x2, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000070000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:22 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:22 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10400e, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000480000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:22 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{0x0, 0x0, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:22 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000480000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:23 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x3, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x2, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:23 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c00b, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000fcfdffff0000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:23 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000040)=""/175, &(0x7f0000000140)=0xaf) syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x1, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@rand_addr, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) ioprio_get$uid(0x3, r1) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) 13:02:23 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000740000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:23 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x108013, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:23 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, 0x0, 0x0, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000001f0000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:23 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10000f, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000000fff0000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:24 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c002, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:24 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{0x0}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x2, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:24 executing program 0: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000090000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:24 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) syncfs(r0) 13:02:24 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100015, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000820e00000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:24 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c001, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:24 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}], 0x5, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000740000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000070000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:25 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c006, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000fffffff50000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:25 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, 0x0, 0x0, 0x2}}], 0x2, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:25 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x108002, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:25 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:25 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) fcntl$addseals(r0, 0x409, 0xf) 13:02:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000040000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:25 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:25 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x104016, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000ffffff8c0000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:25 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10400f, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000700000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:26 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100006, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:26 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:26 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a}}], 0x2, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000003f00000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:26 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:26 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f00000000c0), 0x44840000) 13:02:26 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100007, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 13:02:26 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {0x0}], 0x5, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000f6ffffff0000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:26 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:26 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'\nebug_want_extra_isize'}}]}) [ 549.711767] EXT4-fs: 5 callbacks suppressed [ 549.711779] EXT4-fs (sda1): Unrecognized mount option " [ 549.711779] ebug_want_extra_isize=0x0000000000000000" or missing value 13:02:26 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000006c0000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:27 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:27 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:27 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'%ebug_want_extra_isize'}}]}) 13:02:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000050000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) [ 550.191423] EXT4-fs (sda1): Unrecognized mount option "%ebug_want_extra_isize=0x0000000000000000" or missing value 13:02:27 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)=0x0) wait4(r1, &(0x7f00000000c0), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000011c0)=ANY=[], 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x20, 0x8080fffffffe) r2 = semget(0x0, 0x2, 0x4bd) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}, &(0x7f0000001140)=0x10) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000140)=""/4096) 13:02:27 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:27 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004c40)=""/175, 0xaf}], 0x4, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000004c0000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:27 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:27 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'d%bug_want_extra_isize'}}]}) 13:02:27 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:27 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000007a0000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:27 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{0x0, 0x0, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 550.517767] EXT4-fs (sda1): Unrecognized mount option "d%bug_want_extra_isize=0x0000000000000000" or missing value 13:02:27 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, 0x0, 0x0, 0x0) 13:02:27 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x4, 0x400800) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 13:02:27 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{0x0, 0x0, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:27 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, 0x0, 0x0, 0x0) 13:02:28 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {0x0}], 0x4, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000050000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:28 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debpg_want_extra_isize'}}]}) 13:02:28 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{0x0, 0x0, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:28 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, 0x0, 0x0, 0x0) 13:02:28 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, 0x0, 0x0, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:28 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3, 0x1}, 0x20) [ 551.079339] EXT4-fs (sda1): Unrecognized mount option "debpg_want_extra_isize=0x0000000000000000" or missing value 13:02:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000680000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0xc00) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) recvmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f0000000400)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000000480)}}], 0x718, 0x22, 0x0) [ 551.290702] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 13:02:28 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) socketpair$inet6(0xa, 0x6, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r2, 0x27, &(0x7f0000000140)={0x1, 0x6, 0x647, 0x0, r1}) r3 = syz_open_dev$dmmidi(&(0x7f0000000500)='/dev/dmmidi#\x00', 0x2, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) lstat(&(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r0, &(0x7f0000000380)={&(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0xa800000}, 0xc, &(0x7f0000000080), 0x0, &(0x7f0000000340)=[@cred={0x20, 0x1, 0x2, r1, r4, r5}], 0x20, 0x8000}, 0x40) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r6, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r6, r6, &(0x7f0000000000), 0x8080fffffffe) setsockopt$inet6_icmp_ICMP_FILTER(r6, 0x1, 0x1, &(0x7f0000000080)={0x200000000000004}, 0xfffffffffffffede) 13:02:28 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, 0x0, 0x0, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:28 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'deblg_want_extra_isize'}}]}) 13:02:28 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {0x0}], 0x3, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000230000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:28 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, 0x0, 0x0) 13:02:28 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, 0x0, 0x0, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 551.634802] EXT4-fs (sda1): Unrecognized mount option "deblg_want_extra_isize=0x0000000000000000" or missing value 13:02:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000010000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, 0x0, 0x148502eb) 13:02:28 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}], 0x3, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:28 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debXg_want_extra_isize'}}]}) 13:02:29 executing program 0: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000000)) [ 552.008136] EXT4-fs (sda1): Unrecognized mount option "debXg_want_extra_isize=0x0000000000000000" or missing value 13:02:29 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) 13:02:29 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}], 0x3, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000007fffffff0000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 13:02:29 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debig_want_extra_isize'}}]}) 13:02:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {0x0}], 0x3, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 552.593904] EXT4-fs (sda1): Unrecognized mount option "debig_want_extra_isize=0x0000000000000000" or missing value 13:02:29 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}], 0x3, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:29 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debog_want_extra_isize'}}]}) 13:02:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000010000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:29 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x1f, 0xffff, 0x4, 0x3f, 0x4}, 0x14) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000000140)={0x0, 0x0, 0x2080}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x5d) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) 13:02:29 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {0x0}], 0x4, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 552.880300] EXT4-fs (sda1): Unrecognized mount option "debog_want_extra_isize=0x0000000000000000" or missing value 13:02:30 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {0x0}], 0x4, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:30 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'deb%g_want_extra_isize'}}]}) 13:02:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000004c00000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:30 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {0x0}], 0x4, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 553.140892] EXT4-fs (sda1): Unrecognized mount option "deb%g_want_extra_isize=0x0000000000000000" or missing value 13:02:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000002c0)='fuse\x00', 0xfffffffffffffffe) 13:02:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000000000000000250100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:30 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x3, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:30 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debcg_want_extra_isize'}}]}) 13:02:30 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {0x0}, {0x0}], 0x4, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/dev_mcast\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) [ 553.531707] EXT4-fs (sda1): Unrecognized mount option "debcg_want_extra_isize=0x0000000000000000" or missing value 13:02:30 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYRES64=r0, @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRESHEX=r0, @ANYBLOB="e000c9a414ebc88655d9bc4734071d7acde9ed96075461a5adb667566471769c2ced87844c6be0551b25d3f36656f5cf8b27aeb50714adafd6111b12166cdc6ab72fd4c89d8bd17dd6d8c3db8154c4a311fde12574a4f1420b78ab656b6af80ebf425bd59bd2e924bcff2289ecf76f7d7ce65be2217ca1a71c08479dffed610dc5edc2d20b92528db96eb0c0a943ade6745f580afc58c689c8e663d5e1375044b4"], @ANYPTR64, @ANYRESDEC=r0, @ANYPTR64, @ANYRES64=r0, @ANYPTR=&(0x7f0000000300)=ANY=[@ANYRESOCT=r0, @ANYRESHEX=r0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB="e74e9cd34259e17589f9fa9c71cd3c10005b6b54a3b9c60400b42c4e6a9037c9561f3a5c63514a08414f9d5eaeda484a97bae980ffffffffffffff40743b8b68bbe2ff03de82e9199b669d4311432bac3148516c1de29b2c699832151b5fe98b18df22a2c53c61f07eafa2b1f8db45ae96ae3ebabd1540ab14ca10e6a317f8a2d4095caf07fd15be3d4474d54c4426954bf9805f88462452c762dda0d60b0dde35ec7a1675c7e7f23604e7d6fc247c57ca69539edb24938e70050caf4ee93e49e8594f7b54ebe5db493ddc1d7362493c8d67cfcf9dd5d578a4255666620b9eaca1f5eca37a3cb7e3270105ec980a39c88c6c67907f9ef5f05bdb920cd23d4c1f782fed54c840a616b3374407b2ae701b44d435f826e7710aba4c9fab4e74351faf93c7cc16a7eeef39abdda991f59b4596127c2ff8f7ef91af9a2aa0b97157880e1e408b8995dc3fc147d5c3d682290846851e6733ffdfe2e49a59835db982cae60695159d944a50cd792c83aa12a8f486db1fd9111eca298c9fec6c3d3b6e9b1883b7f0d7ea4704e9a995d90016a5df0ed410080583689894b25a59ee33df3fb3f4bc3b976d29a7"], @ANYPTR], @ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESHEX=r0]]], 0x4c) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000004c0)={@empty, 0x0}, &(0x7f0000000500)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000540)={'team0\x00', r1}) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000040)={0x671, 0x1, @value=0x100000001}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x1, 0x9, 0x6}) 13:02:30 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x3, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000100000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:30 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debdg_want_extra_isize'}}]}) 13:02:30 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x3, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/dev_mcast\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 13:02:31 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debxg_want_extra_isize'}}]}) 13:02:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000fffffdfd0000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:31 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {0x0}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:31 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debsg_want_extra_isize'}}]}) 13:02:31 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004b40)=""/15, 0xf}, {0x0}], 0x3, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000030000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:31 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX=r0, @ANYRES16=r0, @ANYRES32=r0, @ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES32=r0], @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRESDEC=r0, @ANYRES16=r0], 0x51) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) 13:02:31 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {0x0}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000004000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/dev_mcast\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 13:02:31 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_w\nnt_extra_isize'}}]}) [ 554.815534] EXT4-fs: 3 callbacks suppressed [ 554.815546] EXT4-fs (sda1): Unrecognized mount option "debug_w [ 554.815546] nt_extra_isize=0x0000000000000000" or missing value 13:02:32 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {0x0}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004b40)=""/15, 0xf}, {0x0}], 0x3, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000f5ffffff0000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:32 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_wa%t_extra_isize'}}]}) 13:02:32 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x3, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:32 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x3, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 555.252809] EXT4-fs (sda1): Unrecognized mount option "debug_wa%t_extra_isize=0x0000000000000000" or missing value 13:02:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000060000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:32 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x80000000, 0xac, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0x10, 0xfffffffffffffff5, 0x7}, 0x10) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000240)={[0xfffffffffffffffb, 0x363, 0x1, 0x1, 0x0, 0x6, 0x16d, 0x0, 0x9, 0x6, 0x10001, 0x8, 0x9, 0x8c3, 0x7, 0xfffffffffffffffd], 0x2000, 0x4}) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x8001, 0xfffffffffffffe01, 0x2}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)={r1, 0x555}, &(0x7f0000000140)=0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r0, 0x0, 0x7, &(0x7f00000000c0)='lo/em1\x00'}, 0x30) syz_open_procfs(r2, &(0x7f0000000200)='attr/sockcreate\x00') 13:02:32 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x3, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/dev_mcast\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 13:02:32 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_wan%_extra_isize'}}]}) 13:02:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000400000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:32 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {0x0}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 555.838741] EXT4-fs (sda1): Unrecognized mount option "debug_wan%_extra_isize=0x0000000000000000" or missing value 13:02:33 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x204900, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./bus/file0\x00', r0}, 0x10) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fanotify_mark(r0, 0x23, 0x12, r0, &(0x7f0000000140)='./bus/file0\x00') r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000180)={0x4, 0x100000001, 0x3f}) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 13:02:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {0x0}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a0000000000000e820000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:33 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_%xtra_isize'}}]}) 13:02:33 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setsig(r0, 0xa, 0x31) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x200, 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000a40)=ANY=[@ANYBLOB='\x00'], 0x1) sendfile(r2, r2, &(0x7f00000000c0), 0x8080fffffffe) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000000)) 13:02:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {0x0}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000200000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x3, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 556.239920] EXT4-fs (sda1): Unrecognized mount option "debug_want_%xtra_isize=0x0000000000000000" or missing value 13:02:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000004000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{0x0}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:33 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000004b40)=""/15, 0xf}, {0x0}], 0x2, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:33 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_ex%ra_isize'}}]}) [ 556.779685] EXT4-fs (sda1): Unrecognized mount option "debug_want_ex%ra_isize=0x0000000000000000" or missing value 13:02:33 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) geteuid() write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000340)={0x5, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) fsetxattr$security_ima(r0, &(0x7f0000000380)='security.ima\x00', &(0x7f00000003c0)=@md5={0x1, "fbe58b62d79d3c76a23ce08a71b7f26b"}, 0x11, 0x3) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040), 0x4) sendfile(r0, r0, &(0x7f0000000400)=0x3, 0x8080fffffffe) 13:02:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{0x0}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000c0ed00000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:34 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{0x0}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:34 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) readv(r0, &(0x7f0000000580)=[{&(0x7f0000000080)=""/222, 0xde}, {&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000280)=""/119, 0x77}, {&(0x7f0000000000)=""/42, 0x2a}, {&(0x7f0000000300)=""/230, 0xe6}, {0x0}, {&(0x7f0000000500)=""/77, 0x4d}], 0x7) write$P9_RMKNOD(r0, &(0x7f0000000600)={0x14, 0x13, 0x2, {0x48, 0x4, 0x4}}, 0x14) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) 13:02:34 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_ext%a_isize'}}]}) 13:02:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000fff00000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:34 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 557.158547] EXT4-fs (sda1): Unrecognized mount option "debug_want_ext%a_isize=0x0000000000000000" or missing value 13:02:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000040000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:34 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:34 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{0x0}, {0x0}], 0x2, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:34 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extr\n_isize'}}]}) [ 557.511435] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr [ 557.511435] _isize=0x0000000000000000" or missing value 13:02:35 executing program 4: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000080)=0x4) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000040), 0x8080fffffffe) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f00000000c0)='./bus\x00', r0}, 0x10) 13:02:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000600000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:35 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_ixize'}}]}) 13:02:35 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r2, 0x29, 0x43, &(0x7f0000b67000), &(0x7f00007d0000)=0x4) 13:02:35 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{0x0}, {0x0}], 0x2, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 558.016380] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ixize=0x0000000000000000" or missing value 13:02:35 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000000803, 0x4) ioctl(r1, 0x400001000008912, &(0x7f0000000140)="0a5c2d023c126285718070") ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)={0x0, 0xd}) 13:02:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000004800000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:35 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_i.ize'}}]}) 13:02:35 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000000) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) [ 558.374285] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i.ize=0x0000000000000000" or missing value 13:02:35 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x40, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000040)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$UFFDIO_WAKE(r2, 0x8010aa02, &(0x7f0000000000)={&(0x7f000001f000/0x3000)=nil, 0x3000}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000180)={0x0, @local, @remote}, &(0x7f00000001c0)=0xc) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000200)={'nr0\x00', {0x2, 0x4e21, @loopback}}) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000040)="396c92026a45725bde2060d6ac78efefc8e99a06f6b905f0400cb3d9a54664816a857276e3e9465bd4811cd2eb428abdb0171c26fddff33c349f646556d592bfd7a6a18b83514baa7afd8c29b28655e4cee45404d4a5735aa228a503235de1a36bb4bf9c5c078702ab9550dcb8beece5aa615dde87b0222a0f96363249d113a07ccabd94bb081df48827a2a9d941f2fa33dcee9a") 13:02:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:35 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_i#ize'}}]}) 13:02:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000006800000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:35 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 558.879258] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i#ize=0x0000000000000000" or missing value 13:02:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000090000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:36 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_i%ize'}}]}) 13:02:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000060000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:36 executing program 0: 13:02:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, 0x0, 0x0, 0x0) 13:02:36 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000040)={0x7, 0x0, 0x3, 'queue0\x00'}) 13:02:36 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_ioize'}}]}) 13:02:36 executing program 0: 13:02:36 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, 0x0, 0x0, 0x0) 13:02:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000006c0000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:36 executing program 0: 13:02:36 executing program 0: 13:02:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, 0x0, 0x0, 0x0) 13:02:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000900000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:37 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_iiize'}}]}) 13:02:37 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 560.132380] EXT4-fs: 2 callbacks suppressed [ 560.132393] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iiize=0x0000000000000000" or missing value 13:02:37 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x233) ioctl$TIOCNOTTY(r0, 0x5422) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000040)=r0) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000080)={0x95, 0x7fff, 0x3}) 13:02:37 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff}, 0x20) 13:02:37 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = open(&(0x7f0000000500)='./file0\x00', 0x10000, 0x4) bind$bt_rfcomm(r2, &(0x7f0000000440)={0x1f, {0x0, 0x291a, 0x0, 0xfc}}, 0xa) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x8008ae9d, &(0x7f0000001640)=""/50) fchdir(r2) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000003c0)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap='cache=mm%p'}]}}) socket$inet6(0xa, 0x1000000000001, 0x0) ioctl$TCXONC(r2, 0x540a, 0x10001) getpid() sched_setscheduler(0x0, 0x1000000000000005, &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000000)='security.SMACK64EXEC\x00', &(0x7f0000000040)='\x00', 0x1, 0x1) connect(0xffffffffffffffff, &(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x58, &(0x7f0000000180)=[@in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e23, 0x8000, @mcast1, 0x200}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e21, 0x6, @dev={0xfe, 0x80, [], 0xf}, 0xa5}]}, &(0x7f0000000340)=0x10) 13:02:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000003f0000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:37 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_iXize'}}]}) 13:02:37 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{0x0}, {0x0}], 0x2, &(0x7f0000004e00)=""/122, 0x7a}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:37 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = open(&(0x7f0000000500)='./file0\x00', 0x10000, 0x4) bind$bt_rfcomm(r2, &(0x7f0000000440)={0x1f, {0x0, 0x291a, 0x0, 0xfc}}, 0xa) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x8008ae9d, &(0x7f0000001640)=""/50) fchdir(r2) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000003c0)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap='cache=mm%p'}]}}) socket$inet6(0xa, 0x1000000000001, 0x0) ioctl$TCXONC(r2, 0x540a, 0x10001) getpid() sched_setscheduler(0x0, 0x1000000000000005, &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000000)='security.SMACK64EXEC\x00', &(0x7f0000000040)='\x00', 0x1, 0x1) connect(0xffffffffffffffff, &(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x58, &(0x7f0000000180)=[@in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e23, 0x8000, @mcast1, 0x200}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e21, 0x6, @dev={0xfe, 0x80, [], 0xf}, 0xa5}]}, &(0x7f0000000340)=0x10) 13:02:37 executing program 5: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = open(&(0x7f0000000500)='./file0\x00', 0x10000, 0x4) bind$bt_rfcomm(r2, &(0x7f0000000440)={0x1f, {0x0, 0x291a, 0x0, 0xfc}}, 0xa) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x8008ae9d, &(0x7f0000001640)=""/50) fchdir(r2) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000003c0)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap='cache=mm%p'}]}}) socket$inet6(0xa, 0x1000000000001, 0x0) ioctl$TCXONC(r2, 0x540a, 0x10001) getpid() sched_setscheduler(0x0, 0x1000000000000005, &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000000)='security.SMACK64EXEC\x00', &(0x7f0000000040)='\x00', 0x1, 0x1) connect(0xffffffffffffffff, &(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x58, &(0x7f0000000180)=[@in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e23, 0x8000, @mcast1, 0x200}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e21, 0x6, @dev={0xfe, 0x80, [], 0xf}, 0xa5}]}, &(0x7f0000000340)=0x10) [ 560.787302] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iXize=0x0000000000000000" or missing value [ 560.797110] 9p: Unknown Cache mode mm%p 13:02:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000007a0000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) [ 560.956675] 9p: Unknown Cache mode mm%p 13:02:38 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_icize'}}]}) [ 560.978829] 9p: Unknown Cache mode mm%p 13:02:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x1, 0x2) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, 0x0) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, 0x0, 0x0) r4 = accept4(r3, 0x0, &(0x7f00000003c0), 0xfffffffffffffffc) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000080)={0x6, 0x8001}, 0x2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000440), &(0x7f00000004c0)=0x283) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, 0x0) connect$bt_rfcomm(r4, &(0x7f0000000140)={0x1f, {0x0, 0x7f, 0x0, 0x6, 0xfffffffffffff584, 0x4}}, 0xa) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = getpid() sched_setscheduler(r5, 0x0, 0x0) quotactl(0x80000106, 0x0, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000400)={'lo\x00', {0x2, 0x0, @local}}) r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r7, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000000)=[@text16={0x10, &(0x7f0000000500)="baf80c66b86681e28866efbafc0cb8e500eff30f53a20000eac800f500baf80c66b874a3168d66efbafc0c66ed0fb3e60f01caba400066b81100000066ef0f320f015a0e0f1833", 0x47}], 0x1, 0x2, 0x0, 0x3b9) 13:02:38 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = open(&(0x7f0000000500)='./file0\x00', 0x10000, 0x4) bind$bt_rfcomm(r2, &(0x7f0000000440)={0x1f, {0x0, 0x291a, 0x0, 0xfc}}, 0xa) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x8008ae9d, &(0x7f0000001640)=""/50) fchdir(r2) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000003c0)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap='cache=mm%p'}]}}) socket$inet6(0xa, 0x1000000000001, 0x0) ioctl$TCXONC(r2, 0x540a, 0x10001) getpid() sched_setscheduler(0x0, 0x1000000000000005, &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000000)='security.SMACK64EXEC\x00', &(0x7f0000000040)='\x00', 0x1, 0x1) connect(0xffffffffffffffff, &(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x58, &(0x7f0000000180)=[@in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e23, 0x8000, @mcast1, 0x200}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e21, 0x6, @dev={0xfe, 0x80, [], 0xf}, 0xa5}]}, &(0x7f0000000340)=0x10) [ 561.171642] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_icize=0x0000000000000000" or missing value [ 561.356737] 9p: Unknown Cache mode mm%p 13:02:38 executing program 4: sigaltstack(&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000040)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x70400, 0x0) 13:02:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{0x0}, {0x0}], 0x2, &(0x7f0000004e00)=""/122, 0x7a}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x3, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:38 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_i\nize'}}]}) 13:02:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000040000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:38 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = open(&(0x7f0000000500)='./file0\x00', 0x10000, 0x4) bind$bt_rfcomm(r2, &(0x7f0000000440)={0x1f, {0x0, 0x291a, 0x0, 0xfc}}, 0xa) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x8008ae9d, &(0x7f0000001640)=""/50) fchdir(r2) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000003c0)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap='cache=mm%p'}]}}) socket$inet6(0xa, 0x1000000000001, 0x0) ioctl$TCXONC(r2, 0x540a, 0x10001) getpid() sched_setscheduler(0x0, 0x1000000000000005, &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000000)='security.SMACK64EXEC\x00', &(0x7f0000000040)='\x00', 0x1, 0x1) connect(0xffffffffffffffff, &(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x58, &(0x7f0000000180)=[@in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e23, 0x8000, @mcast1, 0x200}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e21, 0x6, @dev={0xfe, 0x80, [], 0xf}, 0xa5}]}, &(0x7f0000000340)=0x10) 13:02:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x1, 0x2) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, 0x0) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, 0x0, 0x0) r4 = accept4(r3, 0x0, &(0x7f00000003c0), 0xfffffffffffffffc) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000080)={0x6, 0x8001}, 0x2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000440), &(0x7f00000004c0)=0x283) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, 0x0) connect$bt_rfcomm(r4, &(0x7f0000000140)={0x1f, {0x0, 0x7f, 0x0, 0x6, 0xfffffffffffff584, 0x4}}, 0xa) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = getpid() sched_setscheduler(r5, 0x0, 0x0) quotactl(0x80000106, 0x0, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000400)={'lo\x00', {0x2, 0x0, @local}}) r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r7, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000000)=[@text16={0x10, &(0x7f0000000500)="baf80c66b86681e28866efbafc0cb8e500eff30f53a20000eac800f500baf80c66b874a3168d66efbafc0c66ed0fb3e60f01caba400066b81100000066ef0f320f015a0e0f1833", 0x47}], 0x1, 0x2, 0x0, 0x3b9) [ 561.697937] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i [ 561.697937] ize=0x0000000000000000" or missing value 13:02:38 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) openat$vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vsock\x00', 0x80400, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000340)='./file0\x00') pipe2(&(0x7f0000000000), 0x800) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x8) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000580)=0xc) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000380), &(0x7f0000000ac0)) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000240)='trusted.overlay.redirect\x00', &(0x7f0000000400)='./file0\x00', 0x8, 0x3) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, &(0x7f0000000180)=0x4ffd) [ 561.781184] 9p: Unknown Cache mode mm%p 13:02:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000007400000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:39 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_i0ize'}}]}) 13:02:39 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) openat$vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vsock\x00', 0x80400, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000340)='./file0\x00') pipe2(&(0x7f0000000000), 0x800) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x8) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000580)=0xc) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000380), &(0x7f0000000ac0)) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000240)='trusted.overlay.redirect\x00', &(0x7f0000000400)='./file0\x00', 0x8, 0x3) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, &(0x7f0000000180)=0x4ffd) 13:02:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000010000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000006c00000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) [ 562.097225] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i0ize=0x0000000000000000" or missing value 13:02:39 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x2) 13:02:39 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{0x0, 0x0, &(0x7f0000004d80)=[{0x0}, {0x0}], 0x2, &(0x7f0000004e00)=""/122, 0x7a}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x3, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:39 executing program 0: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{0x0}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:39 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}], 0x3, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x2, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:39 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_ipize'}}]}) 13:02:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000edc00000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) [ 562.661253] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ipize=0x0000000000000000" or missing value 13:02:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000fdfdffff0000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:39 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_idize'}}]}) 13:02:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000300000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) [ 562.998763] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_idize=0x0000000000000000" or missing value 13:02:40 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_iuize'}}]}) 13:02:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000500000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:40 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003a00)=@can, 0x80, 0x0, 0x0, &(0x7f0000004e00)=""/122, 0x7a}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x3, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 563.454755] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iuize=0x0000000000000000" or missing value 13:02:40 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000400)={0x9, 0x108, 0xfa00, {r2, 0xc4, "9c7fe8", "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"}}, 0x110) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) acct(&(0x7f00000000c0)='./bus\x00') userfaultfd(0x80000) write$binfmt_aout(r3, &(0x7f0000000380)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESHEX=r3, @ANYBLOB="1975599b384c78fb50239c7d9971c5e16a43618a337ae164804ff3a6a7579921857fcff7522bb15880bf3360ea2df2849843aef7343f004c55a5c0fc42ac4f2077aedb1bae61fd86c971c40a2fc1eb0bac920cca224dc66c6a6149b852c15346ba3ba77b85e631e27b7da5974e22fd36d833071ce1ec2b524cd6893c4f54a123bc0470de9ea11c19644dd8b42e646ca1d347000000000000000000", @ANYRES32=r3, @ANYPTR64=&(0x7f0000000180)=ANY=[@ANYRESOCT=r3, @ANYRESDEC=r3, @ANYRESOCT=r3, @ANYRESDEC, @ANYRES32=r3, @ANYRES64=r3, @ANYPTR64], @ANYRES64=r3, @ANYPTR=&(0x7f0000000200)=ANY=[@ANYRESOCT=r3, @ANYRESOCT=r3, @ANYRES32=r3, @ANYRES16=r3]]], 0x8) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000040)={{0xffffffffffffffff, 0x3, 0x1, 0x3, 0x1}}) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x4, @mcast2, 0x2}, 0x1c) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000540)={0x0, 0x9f, "82d34e8e41ca3cdfa6dadeb42e161ce5b22365f800cdb16e3980a1be6586685876f95af09f0ce2a8acdadb286307d594d06d5a460962a1bf44736ab1e14889eb907f5b725229b3ce245432fc4a7745a1dee6b978807298265630cd248eb6638476fd0e124d7b31908886da092e9bbefb9d1bf00345350bed69b907ef4f8dd55d61bbf600fe505d030b3517fd384623b6f6862a296f3b9b6fe969025bbac762"}, &(0x7f0000000600)=0xa7) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000640)={r4, 0x3}, 0x8) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) dup(r1) 13:02:40 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_i*ize'}}]}) 13:02:40 executing program 0: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{0x0, 0x0, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}], 0x4, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x2, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:40 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}], 0x3, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x2, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000002000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) [ 563.735642] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i*ize=0x0000000000000000" or missing value 13:02:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000020000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:41 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_i+ize'}}]}) 13:02:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000020000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:41 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003a00)=@can, 0x80, 0x0}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x3, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 564.170010] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i+ize=0x0000000000000000" or missing value 13:02:41 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_i-ize'}}]}) 13:02:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a000000000000004c0000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) [ 564.434333] Process accounting resumed 13:02:41 executing program 4: openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='io.max\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6d, 0x4000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000140)="56e99a6c2b2cf69c1be93c547920da7085d00bcfb6abfb5037dba4b89553cc78a84b516ae931dcc4576914f5188ab3fdcf", &(0x7f0000000180)="9cec6564561c341337ef85b1ac9310f3ac3cad3bb1f35bf52b97fde2c605c21a7ddb6aa01392a7bc780b428a46a1e6ac86ecd127f3acf9bf23bab02286b685110adcd9faf3801e0c750a3ce2f2b9ad5b9453573cc30fc75a7802c8f6d33391cd4b4f83103962ee0a638e14598e6491e67343084261293164f80b47521abe02c5d40a3004979790", 0x2}, 0x20) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x600000, 0x800000000) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 564.546051] Process accounting resumed 13:02:41 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa, 0x4e21, 0x7, @mcast2, 0x1d3}}}, 0x88) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:02:41 executing program 5: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}], 0x3, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}], 0x2, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:41 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_ilize'}}]}) 13:02:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000001f00000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:41 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) r1 = epoll_create(0xffffffffffffff24) signalfd(r1, &(0x7f0000000040)={0x100000000}, 0x8) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) 13:02:42 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa, 0x4e21, 0x7, @mcast2, 0x1d3}}}, 0x88) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:02:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000fffffdfc0000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:42 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isiz%'}}]}) 13:02:42 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, 0x0, 0x0, &(0x7f0000004e00)=""/122, 0x7a}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x2, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:42 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa, 0x4e21, 0x7, @mcast2, 0x1d3}}}, 0x88) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) 13:02:42 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, 0x0, 0x0, &(0x7f0000004e00)=""/122, 0x7a}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x2, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 565.149937] EXT4-fs: 2 callbacks suppressed [ 565.149950] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz%=0x0000000000000000" or missing value 13:02:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000fffffff60000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:42 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa, 0x4e21, 0x7, @mcast2, 0x1d3}}}, 0x88) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 13:02:42 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:42 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3b}}]}) 13:02:42 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f0000003a00)=@can, 0x80, 0x0, 0x0, &(0x7f0000004e00)=""/122, 0x7a}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x2, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:42 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x2000000000141040, 0x4000000) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) 13:02:42 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa, 0x4e21, 0x7, @mcast2, 0x1d3}}}, 0x88) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) 13:02:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000230000000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:42 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{0x0, 0x0, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003a00)=@can, 0x80, 0x0, 0x0, &(0x7f0000004e00)=""/122, 0x7a}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x3, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 565.654169] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize;0x0000000000000000" or missing value 13:02:42 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa, 0x4e21, 0x7, @mcast2, 0x1d3}}}, 0x88) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) 13:02:42 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x2d}}]}) 13:02:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000680000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:43 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000140)=""/234) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) 13:02:43 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa, 0x4e21, 0x7, @mcast2, 0x1d3}}}, 0x88) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) [ 565.955762] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize-0x0000000000000000" or missing value 13:02:43 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmmsg(r1, &(0x7f0000007200)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/212, 0xd4}, {&(0x7f0000001380)=""/68, 0x44}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x4, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003440)=@sco, 0x80, &(0x7f00000038c0)=[{&(0x7f00000034c0)=""/220, 0xdc}, {&(0x7f00000035c0)=""/251, 0xfb}, {&(0x7f00000036c0)=""/188, 0xbc}, {&(0x7f0000003780)=""/45, 0x2d}, {&(0x7f00000037c0)=""/213, 0xd5}], 0x5, &(0x7f0000003940)=""/172, 0xac, 0x6}, 0x3f}, {{&(0x7f0000003a00)=@can, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/141, 0x8d}, {&(0x7f0000004b40)=""/15, 0xf}, {&(0x7f0000004b80)=""/140, 0x8c}, {&(0x7f0000004c40)=""/175, 0xaf}, {&(0x7f0000004d00)=""/125, 0x7d}], 0x6, &(0x7f0000004e00)=""/122, 0x7a, 0x2}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {&(0x7f0000005000)=""/192, 0xc0}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)=""/4096, 0x1000}, {&(0x7f00000070c0)=""/164, 0xa4}], 0x6, 0x0, 0x0, 0xa2f}, 0x4}], 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x0) 13:02:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000002300000000004d0100000000fffffff600000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 13:02:43 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x200000}}]}) 13:02:43 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x2c8) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa, 0x4e21, 0x7, @mcast2, 0x1d3}}}, 0x88) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./bus\x00', &(0x7f0000000340)='security.SMACK64\x00', 0x0, 0x0, 0x0) 13:02:43 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000007200)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002440)=""/4096, 0x1000, 0x7f}}, {{&(0x7f0000003a00)=@can, 0x80, 0x0, 0x0, &(0x7f0000004e00)=""/122, 0x7a}}, {{&(0x7f0000004e80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000007180)=[{&(0x7f0000004f00)=""/177, 0xb1}, {&(0x7f0000004fc0)=""/14, 0xe}, {0x0}, {0x0}, {&(0x7f00000060c0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0xa2f}, 0x4}], 0x3, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 566.569365] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000200000, [ 566.584945] ================================================================== [ 566.592698] BUG: KASAN: use-after-free in __ext4_expand_extra_isize+0x16f/0x240 [ 566.600149] Write of size 2097152 at addr ffff8881b4408080 by task syz-executor4/28513 [ 566.608196] [ 566.609830] CPU: 0 PID: 28513 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #348 [ 566.617189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 566.626556] Call Trace: [ 566.629172] dump_stack+0x244/0x39d [ 566.632817] ? dump_stack_print_info.cold.1+0x20/0x20 [ 566.638021] ? printk+0xa7/0xcf [ 566.641308] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 566.646086] print_address_description.cold.7+0x9/0x1ff [ 566.651464] kasan_report.cold.8+0x242/0x309 [ 566.655900] ? __ext4_expand_extra_isize+0x16f/0x240 [ 566.661025] check_memory_region+0x13e/0x1b0 [ 566.665448] memset+0x23/0x40 Connection to 10.128.0.25 closed by remote host. [ 566.668594]