x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:20 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:21 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x06', 0x0, 0x0, 0x0) 08:57:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\f', 0x0, 0x0, 0x0) 08:57:21 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf830ba9b9448aebba376c0a75dff27315e9ab8d25f92e6990056e0207fe4d451b62624a1be93d6951b9c42d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7bea3ae603def7f99defee0f55dd287483e308bfa8d9f93b69b2f3b7e0916d4adb266df3240872fc4c9f5e8d86a95ad9a6373915cfbd6f1cc80ce2dd29dda28a539929a959fe736c0c41515562"], 0x264) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:21 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:21 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x2a00000000000000, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\r', 0x0, 0x0, 0x0) 08:57:21 executing program 1: open(0x0, 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:21 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x2d00000000000000, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:21 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/dsp\x00', 0x400000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r0, 0x0, 0xb, &(0x7f0000000840)='metacopy=on', 0xffffffffffffffff}, 0x30) syz_open_procfs(r1, &(0x7f00000008c0)='attr/exec\x00') openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0xfff9, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4081fd) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000200)={0x3, 0x0, [], {0x0, @reserved}}) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fstatfs(r2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000300)={0x14, 0x800, 0x5, 0x8000, 0x70000}) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f0000000000)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x12', 0x0, 0x0, 0x0) 08:57:21 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:21 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:21 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x3b00000000000000, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\xe0', 0x0, 0x0, 0x0) 08:57:22 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x264) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:22 executing program 4: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf6a0ba9b9448aebba376c0a75df6ce2aee3f27315d2ab8d25f92e6990056e0207fe4d451b62624a1be93d69512dff2d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7bea3ae603def7f99defee0f55dd287483e308bfa8d9f93b69b2f3b7e0916d4adb266df3240872fc4c9f5e8d86a973d9a63739156f1cc80ce2dd29dda28a539929a959fe736c0c41515562f7c7d97db6fa2fd8707d74be4c049e0acc305aa95eeae1cef4a1a68b6deb1b9b"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:22 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(0x0, &(0x7f0000000540)) 08:57:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:22 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:22 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:22 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', 0x0) 08:57:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:23 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x264) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:23 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:23 executing program 1 (fault-call:1 fault-nth:0): open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:23 executing program 4 (fault-call:2 fault-nth:0): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1194.714316] FAULT_INJECTION: forcing a failure. [ 1194.714316] name failslab, interval 1, probability 0, space 0, times 0 [ 1194.727773] FAULT_INJECTION: forcing a failure. [ 1194.727773] name failslab, interval 1, probability 0, space 0, times 0 [ 1194.765017] CPU: 1 PID: 7758 Comm: syz-executor1 Not tainted 4.20.0+ #8 [ 1194.771789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1194.781146] Call Trace: [ 1194.783763] dump_stack+0x1db/0x2d0 [ 1194.787413] ? dump_stack_print_info.cold+0x20/0x20 [ 1194.792497] ? check_preemption_disabled+0x48/0x290 [ 1194.797591] ? get_pid_task+0xd4/0x190 [ 1194.801510] should_fail.cold+0xa/0x15 [ 1194.805402] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1194.810514] ? ___might_sleep+0x1e7/0x310 [ 1194.814684] ? arch_local_save_flags+0x50/0x50 [ 1194.819277] ? __f_unlock_pos+0x19/0x20 [ 1194.823262] __should_failslab+0x121/0x190 [ 1194.827504] should_failslab+0x9/0x14 [ 1194.831313] kmem_cache_alloc+0x2be/0x710 [ 1194.835466] ? lock_downgrade+0x910/0x910 [ 1194.839639] getname_flags+0xd6/0x5b0 [ 1194.843456] user_path_at_empty+0x2f/0x50 [ 1194.847607] vfs_statx+0x129/0x210 [ 1194.851150] ? vfs_statx_fd+0xc0/0xc0 [ 1194.854962] ? check_preemption_disabled+0x48/0x290 [ 1194.859983] __do_sys_newstat+0xa4/0x130 [ 1194.864049] ? cp_new_stat+0xab0/0xab0 [ 1194.867959] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1194.873499] ? fput+0x128/0x1a0 [ 1194.876801] ? do_syscall_64+0x8c/0x800 [ 1194.880794] ? do_syscall_64+0x8c/0x800 [ 1194.884781] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1194.889388] ? trace_hardirqs_on+0xbd/0x310 [ 1194.893731] ? __ia32_sys_read+0xb0/0xb0 [ 1194.897799] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1194.903175] ? trace_hardirqs_off_caller+0x300/0x300 [ 1194.908319] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1194.913095] __x64_sys_newstat+0x54/0x80 [ 1194.917177] do_syscall_64+0x1a3/0x800 [ 1194.921085] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1194.926049] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1194.931093] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1194.935950] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1194.941151] RIP: 0033:0x457ec9 [ 1194.944346] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1194.963255] RSP: 002b:00007f200dd47c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 1194.970954] RAX: ffffffffffffffda RBX: 00007f200dd47c90 RCX: 0000000000457ec9 [ 1194.978214] RDX: 0000000000000000 RSI: 0000000020000540 RDI: 0000000020000500 [ 1194.985478] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1194.993227] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f200dd486d4 [ 1195.000503] R13: 00000000004e15fb R14: 00000000004daf78 R15: 0000000000000004 [ 1195.007798] CPU: 0 PID: 7757 Comm: syz-executor4 Not tainted 4.20.0+ #8 [ 1195.014553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1195.023901] Call Trace: [ 1195.026507] dump_stack+0x1db/0x2d0 [ 1195.030137] ? dump_stack_print_info.cold+0x20/0x20 [ 1195.035161] should_fail.cold+0xa/0x15 [ 1195.039051] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1195.044169] ? ___might_sleep+0x1e7/0x310 [ 1195.048328] ? arch_local_save_flags+0x50/0x50 [ 1195.052926] ? trace_hardirqs_on+0xbd/0x310 [ 1195.057251] __should_failslab+0x121/0x190 [ 1195.061502] should_failslab+0x9/0x14 [ 1195.065306] kmem_cache_alloc_node+0x265/0x710 [ 1195.069890] ? __local_bh_enable_ip+0x15a/0x270 [ 1195.074560] ? _raw_spin_unlock_bh+0x31/0x40 [ 1195.078999] __alloc_skb+0xf4/0x730 [ 1195.082624] ? __local_bh_enable_ip+0x15a/0x270 [ 1195.087294] ? skb_scrub_packet+0x440/0x440 [ 1195.091622] ? netlink_insert+0x103/0x240 [ 1195.095775] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1195.101312] ? netlink_autobind.isra.0+0x228/0x310 [ 1195.106251] netlink_sendmsg+0xb11/0xf90 [ 1195.110313] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1195.115862] ? netlink_unicast+0x770/0x770 [ 1195.120103] ? smack_socket_sendmsg+0xb1/0x1a0 [ 1195.124686] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1195.130226] ? security_socket_sendmsg+0x93/0xc0 [ 1195.134978] ? netlink_unicast+0x770/0x770 [ 1195.139212] sock_sendmsg+0xdd/0x130 [ 1195.142926] ___sys_sendmsg+0x7ec/0x910 [ 1195.146910] ? copy_msghdr_from_user+0x570/0x570 [ 1195.151660] ? iterate_fd+0x4b0/0x4b0 [ 1195.155472] ? lock_downgrade+0x910/0x910 [ 1195.159623] ? __fget_light+0x2db/0x420 [ 1195.163598] ? fget_raw+0x20/0x20 [ 1195.167058] ? __mutex_unlock_slowpath+0x195/0x870 [ 1195.172002] ? wait_for_completion+0x810/0x810 [ 1195.176618] ? __fdget+0x1b/0x20 [ 1195.180041] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1195.185599] ? sockfd_lookup_light+0xc2/0x160 [ 1195.190126] __sys_sendmsg+0x112/0x270 [ 1195.194016] ? __ia32_sys_shutdown+0x80/0x80 [ 1195.198433] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1195.203795] ? trace_hardirqs_off_caller+0x300/0x300 [ 1195.208897] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1195.213654] __x64_sys_sendmsg+0x78/0xb0 [ 1195.217717] do_syscall_64+0x1a3/0x800 [ 1195.221624] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1195.226552] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1195.231570] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1195.236416] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1195.241614] RIP: 0033:0x457ec9 [ 1195.244805] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:57:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x6000000000000000, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 1195.263703] RSP: 002b:00007f22b4a4fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1195.271412] RAX: ffffffffffffffda RBX: 00007f22b4a4fc90 RCX: 0000000000457ec9 [ 1195.278681] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000003 [ 1195.285962] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1195.293226] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f22b4a506d4 [ 1195.300491] R13: 00000000004cb4c8 R14: 00000000004d8740 R15: 0000000000000004 08:57:24 executing program 1 (fault-call:1 fault-nth:1): open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:24 executing program 4 (fault-call:2 fault-nth:1): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:24 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x264) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:24 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 1195.545986] FAULT_INJECTION: forcing a failure. [ 1195.545986] name failslab, interval 1, probability 0, space 0, times 0 [ 1195.600195] CPU: 0 PID: 7780 Comm: syz-executor4 Not tainted 4.20.0+ #8 [ 1195.606971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1195.616336] Call Trace: [ 1195.618970] dump_stack+0x1db/0x2d0 [ 1195.622628] ? dump_stack_print_info.cold+0x20/0x20 [ 1195.627642] ? save_stack+0x45/0xd0 [ 1195.631261] ? kasan_kmalloc+0xcf/0xe0 [ 1195.635139] ? kasan_slab_alloc+0xf/0x20 [ 1195.639209] ? kmem_cache_alloc_node+0x144/0x710 [ 1195.643966] ? __alloc_skb+0xf4/0x730 [ 1195.647793] ? sock_sendmsg+0xdd/0x130 [ 1195.651681] should_fail.cold+0xa/0x15 [ 1195.655565] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1195.660674] ? ___might_sleep+0x1e7/0x310 [ 1195.664833] ? arch_local_save_flags+0x50/0x50 [ 1195.669447] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1195.674972] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1195.680505] __should_failslab+0x121/0x190 [ 1195.684749] should_failslab+0x9/0x14 [ 1195.688553] kmem_cache_alloc_node_trace+0x270/0x720 [ 1195.693686] ? __alloc_skb+0xf4/0x730 [ 1195.697495] __kmalloc_node_track_caller+0x3d/0x70 [ 1195.702423] __kmalloc_reserve.isra.0+0x40/0xe0 [ 1195.707130] __alloc_skb+0x12d/0x730 [ 1195.710844] ? __local_bh_enable_ip+0x15a/0x270 [ 1195.715513] ? skb_scrub_packet+0x440/0x440 [ 1195.719836] ? netlink_insert+0x103/0x240 [ 1195.723985] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1195.729549] ? netlink_autobind.isra.0+0x228/0x310 [ 1195.734491] netlink_sendmsg+0xb11/0xf90 [ 1195.738554] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1195.744122] ? netlink_unicast+0x770/0x770 [ 1195.748365] ? smack_socket_sendmsg+0xb1/0x1a0 [ 1195.752952] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1195.758494] ? security_socket_sendmsg+0x93/0xc0 [ 1195.763250] ? netlink_unicast+0x770/0x770 [ 1195.767497] sock_sendmsg+0xdd/0x130 [ 1195.771216] ___sys_sendmsg+0x7ec/0x910 [ 1195.775200] ? copy_msghdr_from_user+0x570/0x570 [ 1195.779954] ? iterate_fd+0x4b0/0x4b0 [ 1195.783763] ? lock_downgrade+0x910/0x910 [ 1195.787916] ? __fget_light+0x2db/0x420 [ 1195.791894] ? fget_raw+0x20/0x20 [ 1195.795356] ? __mutex_unlock_slowpath+0x195/0x870 [ 1195.800287] ? wait_for_completion+0x810/0x810 [ 1195.804868] ? __fdget+0x1b/0x20 [ 1195.808234] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1195.813940] ? sockfd_lookup_light+0xc2/0x160 [ 1195.818455] __sys_sendmsg+0x112/0x270 [ 1195.822352] ? __ia32_sys_shutdown+0x80/0x80 [ 1195.826773] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1195.832139] ? trace_hardirqs_off_caller+0x300/0x300 [ 1195.837241] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1195.842000] __x64_sys_sendmsg+0x78/0xb0 [ 1195.846070] do_syscall_64+0x1a3/0x800 [ 1195.849963] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1195.854896] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1195.859915] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1195.864771] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1195.869957] RIP: 0033:0x457ec9 [ 1195.873153] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1195.892051] RSP: 002b:00007f22b4a4fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1195.899777] RAX: ffffffffffffffda RBX: 00007f22b4a4fc90 RCX: 0000000000457ec9 [ 1195.907108] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000003 [ 1195.914381] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1195.921639] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f22b4a506d4 [ 1195.928903] R13: 00000000004cb4c8 R14: 00000000004d8740 R15: 0000000000000004 [ 1195.936970] FAULT_INJECTION: forcing a failure. [ 1195.936970] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1195.948786] CPU: 1 PID: 7781 Comm: syz-executor1 Not tainted 4.20.0+ #8 [ 1195.955565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1195.964927] Call Trace: [ 1195.967512] dump_stack+0x1db/0x2d0 [ 1195.971137] ? dump_stack_print_info.cold+0x20/0x20 [ 1195.976156] should_fail.cold+0xa/0x15 [ 1195.980053] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1195.985164] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1195.990698] ? _parse_integer+0x139/0x190 [ 1195.994854] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1196.000393] ? _kstrtoull+0x17d/0x250 [ 1196.004195] should_fail_alloc_page+0x50/0x60 [ 1196.008682] __alloc_pages_nodemask+0x323/0xdc0 [ 1196.013354] ? check_preemption_disabled+0x48/0x290 [ 1196.018371] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1196.023383] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1196.028927] ? ___might_sleep+0x1e7/0x310 [ 1196.033073] ? trace_hardirqs_off+0xb8/0x310 [ 1196.037484] cache_grow_begin+0x9c/0x8c0 [ 1196.041573] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1196.047119] kmem_cache_alloc+0x645/0x710 [ 1196.051268] ? lock_downgrade+0x910/0x910 [ 1196.055425] getname_flags+0xd6/0x5b0 [ 1196.059228] user_path_at_empty+0x2f/0x50 [ 1196.063382] vfs_statx+0x129/0x210 [ 1196.066924] ? vfs_statx_fd+0xc0/0xc0 [ 1196.070728] ? check_preemption_disabled+0x48/0x290 [ 1196.075745] __do_sys_newstat+0xa4/0x130 [ 1196.079807] ? cp_new_stat+0xab0/0xab0 [ 1196.083703] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1196.089242] ? fput+0x128/0x1a0 [ 1196.092526] ? do_syscall_64+0x8c/0x800 [ 1196.096504] ? do_syscall_64+0x8c/0x800 [ 1196.100504] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1196.105097] ? trace_hardirqs_on+0xbd/0x310 [ 1196.109415] ? __ia32_sys_read+0xb0/0xb0 [ 1196.113476] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1196.118846] ? trace_hardirqs_off_caller+0x300/0x300 [ 1196.123951] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1196.128711] __x64_sys_newstat+0x54/0x80 [ 1196.132772] do_syscall_64+0x1a3/0x800 [ 1196.136661] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1196.141594] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1196.146619] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1196.151467] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1196.156655] RIP: 0033:0x457ec9 [ 1196.159854] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1196.178752] RSP: 002b:00007f200dd26c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 1196.186456] RAX: ffffffffffffffda RBX: 00007f200dd26c90 RCX: 0000000000457ec9 [ 1196.193721] RDX: 0000000000000000 RSI: 0000000020000540 RDI: 0000000020000500 08:57:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\xff', 0x0, 0x0, 0x0) [ 1196.200987] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1196.208251] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f200dd276d4 [ 1196.215525] R13: 00000000004e15fb R14: 00000000004daf78 R15: 0000000000000003 08:57:25 executing program 4 (fault-call:2 fault-nth:2): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:25 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x01', 0x0, 0x0, 0x0) [ 1196.373028] FAULT_INJECTION: forcing a failure. [ 1196.373028] name failslab, interval 1, probability 0, space 0, times 0 08:57:25 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x0f', 0x0, 0x0, 0x0) [ 1196.432726] CPU: 0 PID: 7798 Comm: syz-executor4 Not tainted 4.20.0+ #8 [ 1196.439509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1196.448972] Call Trace: [ 1196.451586] dump_stack+0x1db/0x2d0 [ 1196.455227] ? dump_stack_print_info.cold+0x20/0x20 [ 1196.460290] should_fail.cold+0xa/0x15 [ 1196.464200] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1196.469352] ? mark_held_locks+0x100/0x100 [ 1196.473627] ? add_lock_to_list.isra.0+0x450/0x450 [ 1196.478562] ? find_held_lock+0x35/0x120 08:57:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 1196.482672] ? __netlink_lookup+0x5fd/0xb50 [ 1196.486995] __should_failslab+0x121/0x190 [ 1196.491237] should_failslab+0x9/0x14 [ 1196.495039] kmem_cache_alloc+0x47/0x710 [ 1196.499113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1196.504656] skb_clone+0x1c5/0x510 [ 1196.508195] ? skb_split+0x1210/0x1210 [ 1196.512098] ? rcu_softirq_qs+0x20/0x20 [ 1196.516124] ? rcu_read_unlock_special+0x380/0x380 [ 1196.521144] netlink_deliver_tap+0xbc0/0xf40 [ 1196.525587] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1196.531166] ? netlink_remove_tap+0x630/0x630 [ 1196.535666] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1196.540957] ? kasan_check_write+0x14/0x20 [ 1196.545221] netlink_unicast+0x5e2/0x770 [ 1196.549300] ? netlink_attachskb+0x980/0x980 [ 1196.553725] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1196.559262] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1196.564312] netlink_sendmsg+0xa05/0xf90 [ 1196.568385] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1196.568412] ? netlink_unicast+0x770/0x770 [ 1196.568429] ? smack_socket_sendmsg+0xb1/0x1a0 08:57:25 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:25 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\xe0', 0x0, 0x0, 0x0) 08:57:25 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) [ 1196.568443] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1196.568458] ? security_socket_sendmsg+0x93/0xc0 [ 1196.593054] ? netlink_unicast+0x770/0x770 [ 1196.597335] sock_sendmsg+0xdd/0x130 [ 1196.601091] ___sys_sendmsg+0x7ec/0x910 [ 1196.605090] ? copy_msghdr_from_user+0x570/0x570 [ 1196.609851] ? iterate_fd+0x4b0/0x4b0 [ 1196.613668] ? lock_downgrade+0x910/0x910 [ 1196.617829] ? __fget_light+0x2db/0x420 [ 1196.621824] ? fget_raw+0x20/0x20 [ 1196.625284] ? __mutex_unlock_slowpath+0x195/0x870 [ 1196.630238] ? wait_for_completion+0x810/0x810 [ 1196.634841] ? __fdget+0x1b/0x20 [ 1196.634855] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1196.634868] ? sockfd_lookup_light+0xc2/0x160 [ 1196.634886] __sys_sendmsg+0x112/0x270 [ 1196.634902] ? __ia32_sys_shutdown+0x80/0x80 [ 1196.643810] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1196.643826] ? trace_hardirqs_off_caller+0x300/0x300 [ 1196.643844] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1196.643864] __x64_sys_sendmsg+0x78/0xb0 [ 1196.675875] do_syscall_64+0x1a3/0x800 [ 1196.679779] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1196.684719] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1196.689753] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1196.694618] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1196.699814] RIP: 0033:0x457ec9 [ 1196.703018] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1196.721924] RSP: 002b:00007f22b4a4fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1196.729640] RAX: ffffffffffffffda RBX: 00007f22b4a4fc90 RCX: 0000000000457ec9 [ 1196.736916] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000003 [ 1196.744189] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1196.751465] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f22b4a506d4 [ 1196.758740] R13: 00000000004cb4c8 R14: 00000000004d8740 R15: 0000000000000004 08:57:25 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x264) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:25 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x01', 0x0, 0x0, 0x0) 08:57:25 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0}) 08:57:25 executing program 4 (fault-call:2 fault-nth:3): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x7900000000000000, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:25 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf6a0ba9b9448aebba376c0a75df6ce2aee3f27315d2ab8d25f92e6990056e0207fe4d451b62624a1be93d69512dff2d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7bea3ae603def7f99defee0f55dd287483e308bfa8d9f93b69b2f3b7e0916d4adb266df3240872fc4c9f5e8d86a973d9a63739156f1cc80ce2dd29dda28a539929a959fe736c0c41515562f7c7d97db6fa2fd8707d74be4c049e0acc305aa95eeae1cef4a1a68b6deb1b9b"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) [ 1197.239609] FAULT_INJECTION: forcing a failure. [ 1197.239609] name failslab, interval 1, probability 0, space 0, times 0 08:57:26 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0}) [ 1197.305041] CPU: 1 PID: 7832 Comm: syz-executor4 Not tainted 4.20.0+ #8 [ 1197.311847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1197.321197] Call Trace: [ 1197.323799] dump_stack+0x1db/0x2d0 [ 1197.327445] ? dump_stack_print_info.cold+0x20/0x20 [ 1197.332466] ? do_raw_spin_trylock+0x270/0x270 [ 1197.337070] should_fail.cold+0xa/0x15 [ 1197.340967] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1197.346089] ? ___might_sleep+0x1e7/0x310 [ 1197.350241] ? arch_local_save_flags+0x50/0x50 [ 1197.354860] __should_failslab+0x121/0x190 [ 1197.359110] should_failslab+0x9/0x14 [ 1197.362923] kmem_cache_alloc_node+0x265/0x710 [ 1197.367529] __alloc_skb+0xf4/0x730 [ 1197.371169] ? skb_scrub_packet+0x440/0x440 [ 1197.375498] ? __lock_is_held+0xb6/0x140 [ 1197.379570] ? add_lock_to_list.isra.0+0x450/0x450 [ 1197.384507] ? add_lock_to_list.isra.0+0x450/0x450 [ 1197.389519] tipc_nl_compat_doit+0x155/0x660 [ 1197.393946] ? tipc_nl_compat_link_stat_dump+0x2f50/0x2f50 [ 1197.399582] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1197.405143] ? ns_capable_common+0x141/0x170 [ 1197.409572] ? ns_capable+0x23/0x30 [ 1197.413208] ? __netlink_ns_capable+0x104/0x140 [ 1197.417901] tipc_nl_compat_recv+0x74a/0x18b0 [ 1197.422410] ? tipc_nl_compat_doit+0x660/0x660 [ 1197.427035] ? genl_rcv_msg+0x13e/0x16c [ 1197.431028] ? tipc_nl_net_dump+0xe50/0xe50 [ 1197.435365] ? tipc_netlink_stop+0x20/0x20 [ 1197.439606] ? __mutex_lock+0x622/0x1670 [ 1197.443683] ? genl_rcv_msg+0x13e/0x16c [ 1197.447685] genl_family_rcv_msg+0x80d/0x11a0 [ 1197.452199] ? genl_unregister_family+0x8a0/0x8a0 [ 1197.457056] ? radix_tree_insert+0x850/0x850 [ 1197.461500] ? netlink_deliver_tap+0x32b/0xf40 [ 1197.466141] genl_rcv_msg+0xca/0x16c [ 1197.469902] netlink_rcv_skb+0x17d/0x410 [ 1197.473990] ? genl_family_rcv_msg+0x11a0/0x11a0 [ 1197.478756] ? netlink_ack+0xba0/0xba0 [ 1197.482657] ? __down_interruptible+0x740/0x740 [ 1197.487347] genl_rcv+0x29/0x40 [ 1197.490654] netlink_unicast+0x574/0x770 [ 1197.494749] ? netlink_attachskb+0x980/0x980 [ 1197.499191] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 08:57:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 1197.504763] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1197.509837] netlink_sendmsg+0xa05/0xf90 [ 1197.513908] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1197.519455] ? netlink_unicast+0x770/0x770 [ 1197.523701] ? smack_socket_sendmsg+0xb1/0x1a0 [ 1197.528289] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1197.533839] ? security_socket_sendmsg+0x93/0xc0 [ 1197.538602] ? netlink_unicast+0x770/0x770 [ 1197.542850] sock_sendmsg+0xdd/0x130 [ 1197.546575] ___sys_sendmsg+0x7ec/0x910 [ 1197.550577] ? copy_msghdr_from_user+0x570/0x570 [ 1197.555365] ? iterate_fd+0x4b0/0x4b0 [ 1197.559183] ? lock_downgrade+0x910/0x910 [ 1197.563351] ? __fget_light+0x2db/0x420 [ 1197.567324] ? fget_raw+0x20/0x20 [ 1197.570789] ? __mutex_unlock_slowpath+0x195/0x870 [ 1197.575730] ? wait_for_completion+0x810/0x810 [ 1197.580314] ? __fdget+0x1b/0x20 [ 1197.583685] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1197.589263] ? sockfd_lookup_light+0xc2/0x160 [ 1197.593774] __sys_sendmsg+0x112/0x270 [ 1197.597666] ? __ia32_sys_shutdown+0x80/0x80 [ 1197.602103] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1197.607487] ? trace_hardirqs_off_caller+0x300/0x300 [ 1197.612610] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1197.617380] __x64_sys_sendmsg+0x78/0xb0 [ 1197.621464] do_syscall_64+0x1a3/0x800 [ 1197.625360] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1197.630292] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1197.635351] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1197.640203] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1197.645389] RIP: 0033:0x457ec9 [ 1197.645419] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1197.645426] RSP: 002b:00007f22b4a4fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1197.645440] RAX: ffffffffffffffda RBX: 00007f22b4a4fc90 RCX: 0000000000457ec9 [ 1197.645449] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000003 [ 1197.645457] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1197.645465] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f22b4a506d4 08:57:26 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0}) 08:57:26 executing program 4 (fault-call:2 fault-nth:4): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1197.645473] R13: 00000000004cb4c8 R14: 00000000004d8740 R15: 0000000000000004 08:57:26 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r3 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r3, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) [ 1197.813391] FAULT_INJECTION: forcing a failure. [ 1197.813391] name failslab, interval 1, probability 0, space 0, times 0 [ 1197.839806] CPU: 0 PID: 7851 Comm: syz-executor4 Not tainted 4.20.0+ #8 [ 1197.846572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1197.855924] Call Trace: [ 1197.858540] dump_stack+0x1db/0x2d0 [ 1197.862186] ? dump_stack_print_info.cold+0x20/0x20 [ 1197.867260] ? save_stack+0x45/0xd0 [ 1197.870904] ? kasan_kmalloc+0xcf/0xe0 [ 1197.874814] ? kasan_slab_alloc+0xf/0x20 [ 1197.878881] ? kmem_cache_alloc_node+0x144/0x710 [ 1197.883639] ? __alloc_skb+0xf4/0x730 [ 1197.887471] ? tipc_nl_compat_recv+0x74a/0x18b0 [ 1197.892157] should_fail.cold+0xa/0x15 [ 1197.896078] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1197.901206] ? ___might_sleep+0x1e7/0x310 [ 1197.905360] ? arch_local_save_flags+0x50/0x50 [ 1197.905390] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1197.905403] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1197.905439] __should_failslab+0x121/0x190 [ 1197.905457] should_failslab+0x9/0x14 [ 1197.905471] kmem_cache_alloc_node_trace+0x270/0x720 [ 1197.905486] ? __alloc_skb+0xf4/0x730 [ 1197.921185] __kmalloc_node_track_caller+0x3d/0x70 [ 1197.938110] __kmalloc_reserve.isra.0+0x40/0xe0 [ 1197.938131] __alloc_skb+0x12d/0x730 [ 1197.938170] ? skb_scrub_packet+0x440/0x440 [ 1197.955793] ? __lock_is_held+0xb6/0x140 [ 1197.955809] ? add_lock_to_list.isra.0+0x450/0x450 [ 1197.955825] ? add_lock_to_list.isra.0+0x450/0x450 [ 1197.955843] tipc_nl_compat_doit+0x155/0x660 [ 1197.955862] ? tipc_nl_compat_link_stat_dump+0x2f50/0x2f50 [ 1197.955879] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1197.955896] ? ns_capable_common+0x141/0x170 [ 1197.964903] ? ns_capable+0x23/0x30 [ 1197.964921] ? __netlink_ns_capable+0x104/0x140 [ 1197.964941] tipc_nl_compat_recv+0x74a/0x18b0 [ 1197.964959] ? tipc_nl_compat_doit+0x660/0x660 [ 1197.964972] ? genl_rcv_msg+0x13e/0x16c [ 1197.965004] ? tipc_nl_net_dump+0xe50/0xe50 [ 1197.974319] ? tipc_netlink_stop+0x20/0x20 [ 1197.974343] ? __mutex_lock+0x622/0x1670 [ 1197.974360] ? genl_rcv_msg+0x13e/0x16c [ 1197.974387] genl_family_rcv_msg+0x80d/0x11a0 [ 1197.993582] ? genl_unregister_family+0x8a0/0x8a0 [ 1197.993623] ? radix_tree_insert+0x850/0x850 [ 1197.993656] ? netlink_deliver_tap+0x32b/0xf40 [ 1197.993718] genl_rcv_msg+0xca/0x16c [ 1198.011362] netlink_rcv_skb+0x17d/0x410 [ 1198.027889] ? genl_family_rcv_msg+0x11a0/0x11a0 [ 1198.027907] ? netlink_ack+0xba0/0xba0 [ 1198.027925] ? __down_interruptible+0x740/0x740 [ 1198.027946] genl_rcv+0x29/0x40 [ 1198.037260] netlink_unicast+0x574/0x770 [ 1198.037283] ? netlink_attachskb+0x980/0x980 [ 1198.037299] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1198.037312] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1198.037338] netlink_sendmsg+0xa05/0xf90 [ 1198.093701] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1198.099265] ? netlink_unicast+0x770/0x770 [ 1198.103521] ? smack_socket_sendmsg+0xb1/0x1a0 [ 1198.108123] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 08:57:26 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x264) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:26 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0}) [ 1198.113668] ? security_socket_sendmsg+0x93/0xc0 [ 1198.118429] ? netlink_unicast+0x770/0x770 [ 1198.122714] sock_sendmsg+0xdd/0x130 [ 1198.126435] ___sys_sendmsg+0x7ec/0x910 [ 1198.130463] ? copy_msghdr_from_user+0x570/0x570 [ 1198.135219] ? iterate_fd+0x4b0/0x4b0 [ 1198.139037] ? lock_downgrade+0x910/0x910 [ 1198.143203] ? __fget_light+0x2db/0x420 [ 1198.147182] ? fget_raw+0x20/0x20 [ 1198.150658] ? __mutex_unlock_slowpath+0x195/0x870 [ 1198.155602] ? wait_for_completion+0x810/0x810 [ 1198.160187] ? __fdget+0x1b/0x20 [ 1198.163582] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1198.169144] ? sockfd_lookup_light+0xc2/0x160 [ 1198.173666] __sys_sendmsg+0x112/0x270 [ 1198.177560] ? __ia32_sys_shutdown+0x80/0x80 [ 1198.181983] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1198.187350] ? trace_hardirqs_off_caller+0x300/0x300 [ 1198.187368] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1198.187401] __x64_sys_sendmsg+0x78/0xb0 [ 1198.187417] do_syscall_64+0x1a3/0x800 [ 1198.205175] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1198.210140] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1198.215175] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1198.215197] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1198.215209] RIP: 0033:0x457ec9 [ 1198.215238] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1198.215248] RSP: 002b:00007f22b4a4fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1198.255047] RAX: ffffffffffffffda RBX: 00007f22b4a4fc90 RCX: 0000000000457ec9 08:57:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 1198.262348] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000003 [ 1198.269638] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1198.276909] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f22b4a506d4 [ 1198.284191] R13: 00000000004cb4c8 R14: 00000000004d8740 R15: 0000000000000004 08:57:27 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0}) 08:57:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:27 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0}) 08:57:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x97ffffff00000000, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:27 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r3 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r3, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:27 executing program 4 (fault-call:2 fault-nth:5): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:27 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0}) [ 1198.783851] FAULT_INJECTION: forcing a failure. [ 1198.783851] name failslab, interval 1, probability 0, space 0, times 0 [ 1198.812476] CPU: 0 PID: 7897 Comm: syz-executor4 Not tainted 4.20.0+ #8 [ 1198.819267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1198.828695] Call Trace: [ 1198.831297] dump_stack+0x1db/0x2d0 [ 1198.834949] ? dump_stack_print_info.cold+0x20/0x20 [ 1198.839977] ? __kmalloc_node_track_caller+0x3d/0x70 [ 1198.845106] should_fail.cold+0xa/0x15 [ 1198.849000] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1198.854154] ? ___might_sleep+0x1e7/0x310 [ 1198.858313] ? arch_local_save_flags+0x50/0x50 [ 1198.862911] ? __alloc_skb+0x491/0x730 [ 1198.866802] __should_failslab+0x121/0x190 [ 1198.871045] should_failslab+0x9/0x14 [ 1198.874860] __kmalloc+0x2dc/0x740 [ 1198.878415] ? add_lock_to_list.isra.0+0x450/0x450 [ 1198.883362] ? tipc_nl_compat_doit+0x1af/0x660 [ 1198.887955] tipc_nl_compat_doit+0x1af/0x660 [ 1198.892378] ? tipc_nl_compat_link_stat_dump+0x2f50/0x2f50 [ 1198.898012] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1198.903592] ? ns_capable_common+0x141/0x170 [ 1198.908008] ? ns_capable+0x23/0x30 [ 1198.911645] ? __netlink_ns_capable+0x104/0x140 [ 1198.916345] tipc_nl_compat_recv+0x74a/0x18b0 [ 1198.920848] ? tipc_nl_compat_doit+0x660/0x660 [ 1198.925450] ? genl_rcv_msg+0x13e/0x16c [ 1198.929460] ? tipc_nl_net_dump+0xe50/0xe50 [ 1198.933788] ? tipc_netlink_stop+0x20/0x20 [ 1198.938031] ? __mutex_lock+0x622/0x1670 [ 1198.942116] ? genl_rcv_msg+0x13e/0x16c [ 1198.946116] genl_family_rcv_msg+0x80d/0x11a0 [ 1198.950617] ? genl_unregister_family+0x8a0/0x8a0 [ 1198.955469] ? radix_tree_insert+0x850/0x850 [ 1198.959879] ? netlink_deliver_tap+0x32b/0xf40 [ 1198.964499] genl_rcv_msg+0xca/0x16c [ 1198.968264] netlink_rcv_skb+0x17d/0x410 [ 1198.972341] ? genl_family_rcv_msg+0x11a0/0x11a0 [ 1198.977106] ? netlink_ack+0xba0/0xba0 [ 1198.981000] ? __down_interruptible+0x740/0x740 [ 1198.985703] genl_rcv+0x29/0x40 [ 1198.989053] netlink_unicast+0x574/0x770 [ 1198.993179] ? netlink_attachskb+0x980/0x980 [ 1198.997630] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1199.003172] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1199.008213] netlink_sendmsg+0xa05/0xf90 [ 1199.012279] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1199.017828] ? netlink_unicast+0x770/0x770 [ 1199.022110] ? smack_socket_sendmsg+0xb1/0x1a0 [ 1199.026702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1199.032231] ? security_socket_sendmsg+0x93/0xc0 [ 1199.036968] ? netlink_unicast+0x770/0x770 [ 1199.041185] sock_sendmsg+0xdd/0x130 [ 1199.045076] ___sys_sendmsg+0x7ec/0x910 [ 1199.049056] ? copy_msghdr_from_user+0x570/0x570 [ 1199.053818] ? iterate_fd+0x4b0/0x4b0 [ 1199.057630] ? lock_downgrade+0x910/0x910 [ 1199.061777] ? __fget_light+0x2db/0x420 [ 1199.065736] ? fget_raw+0x20/0x20 [ 1199.069198] ? __mutex_unlock_slowpath+0x195/0x870 [ 1199.074158] ? wait_for_completion+0x810/0x810 [ 1199.078747] ? __fdget+0x1b/0x20 [ 1199.082103] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1199.087661] ? sockfd_lookup_light+0xc2/0x160 [ 1199.092199] __sys_sendmsg+0x112/0x270 [ 1199.096086] ? __ia32_sys_shutdown+0x80/0x80 [ 1199.100483] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1199.105834] ? trace_hardirqs_off_caller+0x300/0x300 [ 1199.110924] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1199.115666] __x64_sys_sendmsg+0x78/0xb0 [ 1199.119710] do_syscall_64+0x1a3/0x800 [ 1199.123611] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1199.128524] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1199.133544] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1199.138385] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1199.143585] RIP: 0033:0x457ec9 [ 1199.146761] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1199.165814] RSP: 002b:00007f22b4a4fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1199.173511] RAX: ffffffffffffffda RBX: 00007f22b4a4fc90 RCX: 0000000000457ec9 [ 1199.180771] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000003 [ 1199.188037] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1199.195301] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f22b4a506d4 [ 1199.202571] R13: 00000000004cb4c8 R14: 00000000004d8740 R15: 0000000000000004 08:57:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0xebffffff00000000, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:28 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x264) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:28 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0}) 08:57:28 executing program 4 (fault-call:2 fault-nth:6): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0xf5ffffff00000000, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:28 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0}) [ 1199.401901] FAULT_INJECTION: forcing a failure. [ 1199.401901] name failslab, interval 1, probability 0, space 0, times 0 [ 1199.429632] CPU: 1 PID: 7917 Comm: syz-executor4 Not tainted 4.20.0+ #8 [ 1199.436407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1199.445753] Call Trace: [ 1199.445778] dump_stack+0x1db/0x2d0 [ 1199.445799] ? dump_stack_print_info.cold+0x20/0x20 [ 1199.445820] ? __kmalloc_node_track_caller+0x3d/0x70 [ 1199.445856] should_fail.cold+0xa/0x15 [ 1199.445875] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1199.452093] ? ___might_sleep+0x1e7/0x310 [ 1199.452111] ? arch_local_save_flags+0x50/0x50 [ 1199.452130] ? __alloc_skb+0x491/0x730 [ 1199.483808] __should_failslab+0x121/0x190 [ 1199.488056] should_failslab+0x9/0x14 [ 1199.491883] __kmalloc+0x2dc/0x740 [ 1199.495460] ? add_lock_to_list.isra.0+0x450/0x450 [ 1199.500416] ? tipc_nl_compat_doit+0x1af/0x660 [ 1199.505019] tipc_nl_compat_doit+0x1af/0x660 [ 1199.509432] ? tipc_nl_compat_link_stat_dump+0x2f50/0x2f50 [ 1199.515082] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1199.520623] ? ns_capable_common+0x141/0x170 [ 1199.525071] ? ns_capable+0x23/0x30 [ 1199.528707] ? __netlink_ns_capable+0x104/0x140 [ 1199.533387] tipc_nl_compat_recv+0x74a/0x18b0 [ 1199.537890] ? tipc_nl_compat_doit+0x660/0x660 [ 1199.542500] ? genl_rcv_msg+0x13e/0x16c [ 1199.546477] ? tipc_nl_net_dump+0xe50/0xe50 [ 1199.550795] ? tipc_netlink_stop+0x20/0x20 [ 1199.555094] ? __mutex_lock+0x622/0x1670 [ 1199.559164] ? genl_rcv_msg+0x13e/0x16c [ 1199.563186] genl_family_rcv_msg+0x80d/0x11a0 [ 1199.567690] ? genl_unregister_family+0x8a0/0x8a0 [ 1199.572576] ? radix_tree_insert+0x850/0x850 [ 1199.576982] ? netlink_deliver_tap+0x32b/0xf40 [ 1199.581589] genl_rcv_msg+0xca/0x16c [ 1199.585310] netlink_rcv_skb+0x17d/0x410 [ 1199.589391] ? genl_family_rcv_msg+0x11a0/0x11a0 [ 1199.594149] ? netlink_ack+0xba0/0xba0 [ 1199.598043] ? __down_interruptible+0x740/0x740 [ 1199.602733] genl_rcv+0x29/0x40 [ 1199.606014] netlink_unicast+0x574/0x770 [ 1199.610089] ? netlink_attachskb+0x980/0x980 [ 1199.614504] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1199.620036] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1199.625075] netlink_sendmsg+0xa05/0xf90 [ 1199.629138] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1199.634700] ? netlink_unicast+0x770/0x770 [ 1199.638939] ? smack_socket_sendmsg+0xb1/0x1a0 [ 1199.643520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1199.649057] ? security_socket_sendmsg+0x93/0xc0 [ 1199.653817] ? netlink_unicast+0x770/0x770 [ 1199.658070] sock_sendmsg+0xdd/0x130 [ 1199.661786] ___sys_sendmsg+0x7ec/0x910 [ 1199.665764] ? copy_msghdr_from_user+0x570/0x570 [ 1199.670517] ? iterate_fd+0x4b0/0x4b0 [ 1199.674323] ? lock_downgrade+0x910/0x910 [ 1199.678491] ? __fget_light+0x2db/0x420 [ 1199.682479] ? fget_raw+0x20/0x20 [ 1199.685931] ? __mutex_unlock_slowpath+0x195/0x870 [ 1199.690893] ? wait_for_completion+0x810/0x810 [ 1199.695477] ? __fdget+0x1b/0x20 [ 1199.698855] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1199.704392] ? sockfd_lookup_light+0xc2/0x160 [ 1199.708891] __sys_sendmsg+0x112/0x270 [ 1199.712954] ? __ia32_sys_shutdown+0x80/0x80 [ 1199.717387] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1199.723386] ? trace_hardirqs_off_caller+0x300/0x300 [ 1199.728527] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1199.733320] __x64_sys_sendmsg+0x78/0xb0 [ 1199.737383] do_syscall_64+0x1a3/0x800 [ 1199.741303] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1199.746246] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1199.751268] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1199.756123] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1199.761311] RIP: 0033:0x457ec9 [ 1199.764535] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1199.783431] RSP: 002b:00007f22b4a4fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1199.791140] RAX: ffffffffffffffda RBX: 00007f22b4a4fc90 RCX: 0000000000457ec9 [ 1199.798409] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000003 [ 1199.805674] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1199.812954] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f22b4a506d4 [ 1199.820218] R13: 00000000004cb4c8 R14: 00000000004d8740 R15: 0000000000000004 08:57:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:28 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:28 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0}) 08:57:28 executing program 4 (fault-call:2 fault-nth:7): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 1200.214183] FAULT_INJECTION: forcing a failure. [ 1200.214183] name failslab, interval 1, probability 0, space 0, times 0 [ 1200.271621] CPU: 0 PID: 7947 Comm: syz-executor4 Not tainted 4.20.0+ #8 [ 1200.278398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1200.287756] Call Trace: [ 1200.290374] dump_stack+0x1db/0x2d0 [ 1200.294020] ? dump_stack_print_info.cold+0x20/0x20 [ 1200.299130] should_fail.cold+0xa/0x15 [ 1200.303032] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1200.308158] ? ___might_sleep+0x1e7/0x310 [ 1200.308182] ? arch_local_save_flags+0x50/0x50 [ 1200.308207] __should_failslab+0x121/0x190 08:57:29 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x264) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:29 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0}) 08:57:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0xf8f73f0000000000, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 1200.308233] should_failslab+0x9/0x14 [ 1200.308248] kmem_cache_alloc_node+0x265/0x710 [ 1200.308281] __alloc_skb+0xf4/0x730 [ 1200.308300] ? skb_scrub_packet+0x440/0x440 [ 1200.308315] ? rcu_read_lock_sched_held+0x110/0x130 [ 1200.308336] ? __kmalloc+0x5d5/0x740 [ 1200.308352] ? add_lock_to_list.isra.0+0x450/0x450 [ 1200.317350] ? tipc_nl_compat_doit+0x1af/0x660 [ 1200.317371] tipc_nl_compat_doit+0x1da/0x660 [ 1200.317425] ? tipc_nl_compat_link_stat_dump+0x2f50/0x2f50 [ 1200.317443] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 08:57:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 1200.317459] ? ns_capable_common+0x141/0x170 [ 1200.317473] ? ns_capable+0x23/0x30 [ 1200.317491] ? __netlink_ns_capable+0x104/0x140 [ 1200.317511] tipc_nl_compat_recv+0x74a/0x18b0 [ 1200.317531] ? tipc_nl_compat_doit+0x660/0x660 [ 1200.317545] ? genl_rcv_msg+0x13e/0x16c [ 1200.317558] ? tipc_nl_net_dump+0xe50/0xe50 [ 1200.317570] ? tipc_netlink_stop+0x20/0x20 [ 1200.317586] ? __mutex_lock+0x622/0x1670 [ 1200.410184] ? genl_rcv_msg+0x13e/0x16c [ 1200.414194] genl_family_rcv_msg+0x80d/0x11a0 [ 1200.418736] ? genl_unregister_family+0x8a0/0x8a0 [ 1200.423621] ? radix_tree_insert+0x850/0x850 [ 1200.428051] ? netlink_deliver_tap+0x32b/0xf40 [ 1200.432684] genl_rcv_msg+0xca/0x16c [ 1200.436436] netlink_rcv_skb+0x17d/0x410 [ 1200.440521] ? genl_family_rcv_msg+0x11a0/0x11a0 [ 1200.445308] ? netlink_ack+0xba0/0xba0 [ 1200.449381] ? __down_interruptible+0x740/0x740 [ 1200.454096] genl_rcv+0x29/0x40 [ 1200.457384] netlink_unicast+0x574/0x770 [ 1200.461453] ? netlink_attachskb+0x980/0x980 [ 1200.465875] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 08:57:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\xff', 0x0, 0x0, 0x0) [ 1200.471420] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1200.476450] netlink_sendmsg+0xa05/0xf90 [ 1200.480518] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1200.486093] ? netlink_unicast+0x770/0x770 [ 1200.490338] ? smack_socket_sendmsg+0xb1/0x1a0 [ 1200.494920] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1200.500453] ? security_socket_sendmsg+0x93/0xc0 [ 1200.505240] ? netlink_unicast+0x770/0x770 [ 1200.509475] sock_sendmsg+0xdd/0x130 [ 1200.513185] ___sys_sendmsg+0x7ec/0x910 [ 1200.517163] ? copy_msghdr_from_user+0x570/0x570 [ 1200.521913] ? iterate_fd+0x4b0/0x4b0 [ 1200.525720] ? lock_downgrade+0x910/0x910 [ 1200.529876] ? __fget_light+0x2db/0x420 [ 1200.533849] ? fget_raw+0x20/0x20 [ 1200.537300] ? __mutex_unlock_slowpath+0x195/0x870 [ 1200.542245] ? wait_for_completion+0x810/0x810 [ 1200.546824] ? __fdget+0x1b/0x20 [ 1200.550199] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1200.555731] ? sockfd_lookup_light+0xc2/0x160 [ 1200.560230] __sys_sendmsg+0x112/0x270 [ 1200.564144] ? __ia32_sys_shutdown+0x80/0x80 [ 1200.568565] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1200.573943] ? trace_hardirqs_off_caller+0x300/0x300 [ 1200.579045] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1200.583811] __x64_sys_sendmsg+0x78/0xb0 [ 1200.587873] do_syscall_64+0x1a3/0x800 [ 1200.591760] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1200.596695] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1200.601721] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1200.606573] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1200.611760] RIP: 0033:0x457ec9 [ 1200.614958] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1200.633861] RSP: 002b:00007f22b4a4fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1200.641566] RAX: ffffffffffffffda RBX: 00007f22b4a4fc90 RCX: 0000000000457ec9 [ 1200.648832] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000003 [ 1200.656098] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1200.663364] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f22b4a506d4 [ 1200.670630] R13: 00000000004cb4c8 R14: 00000000004d8740 R15: 0000000000000004 08:57:29 executing program 4 (fault-call:2 fault-nth:8): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:29 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:29 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0}) 08:57:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0xfcfdffff00000000, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\xff', 0x0, 0x0, 0x0) 08:57:29 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0}) 08:57:30 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf830ba9b9448aebba376c0a75dff27315e9ab8d25f92e6990056e0207fe4d451b62624a1be93d6951b9c42d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7bea3ae603def7f99defee0f55dd287483e308bfa8d9f93b69b2f3b7e0916d4adb266df3240872fc4c9f5e8d86a95ad9a6373915cfbd6f1cc80ce2dd29dda28a539929a959fe736c0c41515562"], 0x264) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\xff', 0x0, 0x0, 0x0) 08:57:30 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0}) 08:57:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x2, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0xfdffffff00000000, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x3, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:30 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0}) 08:57:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\xff', 0x0, 0x0, 0x0) 08:57:30 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, 0x0, 0x13f, 0xa}}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r3 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r3, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:30 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x264) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\xff', 0x0, 0x0, 0x0) 08:57:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x4, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:30 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 08:57:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x8, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\xff', 0x0, 0x0, 0x0) 08:57:31 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 08:57:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40eb, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0xa, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:31 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:31 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 08:57:31 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf830ba9b9448aebba376c0a75dff27315e9ab8d25f92e6990056e0207fe4d451b62624a1be93d6951b9c42d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7bea3ae603def7f99defee0f55dd287483e308bfa8d9f93b69b2f3b7e0916d4adb266df3240872fc4c9f5e8d86a95ad9a6373915cfbd6f1cc80ce2dd29dda28a539929a959fe736c0c41515562"], 0x264) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0xe, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40ec, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:31 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 08:57:31 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 08:57:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0xf, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 1203.149867] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000,noquota,auto_da_alloc=0x0000000000000000, [ 1203.225406] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000,noquota,auto_da_alloc=0x0000000000000000, 08:57:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'\nebug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:32 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 08:57:32 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf6a0ba9b9448aebba376c0a75df6ce2aee3f27315d2ab8d25f92e6990056e0207fe4d451b62624a1be93d69512dff2d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7bea3ae603def7f99defee0f55dd287483e308bfa8d9f93b69b2f3b7e0916d4adb266df3240872fc4c9f5e8d86a973d9a63739156f1cc80ce2dd29dda28a539929a959fe736c0c41515562f7c7d97db6fa2fd8707d74be4c049e0acc305aa95eeae1cef4a1a68b6deb1b9b"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x7f', 0x0, 0x0, 0x0) [ 1203.557002] EXT4-fs (sda1): Unrecognized mount option " [ 1203.557002] ebug_want_extra_isize=0x0000000000000000" or missing value [ 1203.639739] EXT4-fs (sda1): Unrecognized mount option " [ 1203.639739] ebug_want_extra_isize=0x0000000000000000" or missing value 08:57:32 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x264) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x10, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x8b', 0x0, 0x0, 0x0) 08:57:32 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 08:57:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'%ebug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:32 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf6a0ba9b9448aebba376c0a75df6ce2aee3f27315d2ab8d25f92e6990056e0207fe4d451b62624a1be93d69512dff2d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7bea3ae603def7f99defee0f55dd287483e308bfa8d9f93b69b2f3b7e0916d4adb266df3240872fc4c9f5e8d86a973d9a63739156f1cc80ce2dd29dda28a539929a959fe736c0c41515562f7c7d97db6fa2fd8707d74be4c049e0acc305aa95eeae1cef4a1a68b6deb1b9b"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x60, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1204.074297] EXT4-fs (sda1): Unrecognized mount option "%ebug_want_extra_isize=0x0000000000000000" or missing value 08:57:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x8c', 0x0, 0x0, 0x0) 08:57:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0xf0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:33 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1204.278441] EXT4-fs (sda1): Unrecognized mount option "%ebug_want_extra_isize=0x0000000000000000" or missing value 08:57:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\xe0', 0x0, 0x0, 0x0) 08:57:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'\x85ebug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 1204.589620] EXT4-fs (sda1): Unrecognized mount option "…ebug_want_extra_isize=0x0000000000000000" or missing value [ 1204.678944] EXT4-fs (sda1): Unrecognized mount option "…ebug_want_extra_isize=0x0000000000000000" or missing value 08:57:33 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x264) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:33 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 08:57:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x300, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\xe4', 0x0, 0x0, 0x0) 08:57:33 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'d\nbug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0xa00, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1205.047937] EXT4-fs (sda1): Unrecognized mount option "d [ 1205.047937] bug_want_extra_isize=0x0000000000000000" or missing value 08:57:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\xf6', 0x0, 0x0, 0x0) 08:57:33 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1205.190558] EXT4-fs (sda1): Unrecognized mount option "d [ 1205.190558] bug_want_extra_isize=0x0000000000000000" or missing value 08:57:34 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 08:57:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0xe00, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'d%bug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:34 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:34 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 08:57:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\xfe', 0x0, 0x0, 0x0) 08:57:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0xebc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'d\x85bug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:34 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:34 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 08:57:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0xf00, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:34 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 08:57:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x6000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:35 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 08:57:35 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e20, @remote}}, 0x8001, 0x0, 0x3, 0x9, 0x6}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000100)=r1, 0x4) 08:57:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'de\nug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0xbc0e, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:35 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:35 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:35 executing program 1: open(&(0x7f0000000040)='./bus\x00', 0xfffffffffffffff9, 0xc0) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000080)) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8, 0x0) 08:57:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0xf000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'de%ug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:35 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) shutdown(r0, 0xc7cb3b21a0b18872) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x95}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000100)={r2, 0x78, &(0x7f0000000080)=[@in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e23, 0x9, @mcast2, 0x7}, @in6={0xa, 0x4e23, 0x8, @mcast1, 0x2}, @in={0x2, 0x4e24, @empty}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x26}}]}, &(0x7f0000000140)=0x10) 08:57:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x30000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x34000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:36 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x880, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x60b46b17ea7f4c34}, 0xc, &(0x7f0000000400)={&(0x7f00000005c0)=ANY=[@ANYBLOB="20010000", @ANYRES16=r1, @ANYBLOB="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"], 0x120}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@md5={0x1, "f9d94f261550d1e4d6102a210c228cc8"}, 0x11, 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@mcast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000300)=0x0) fchownat(r2, &(0x7f00000000c0)='./bus\x00', r3, r4, 0x1000) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x400300, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:36 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:36 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0xa0277159d5db45c, 0x0) r1 = dup(r0) symlinkat(&(0x7f0000000000)='./bus\x00', r1, &(0x7f0000000040)='./file0\x00') open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000080)=0xffff) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'de\x85ug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0xf0ffff, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:36 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x1000000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:36 executing program 1: open(&(0x7f0000000040)='./bus\x00', 0x101000, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'deb\ng_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x2000000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1208.243476] EXT4-fs: 9 callbacks suppressed [ 1208.243488] EXT4-fs (sda1): Unrecognized mount option "deb [ 1208.243488] g_want_extra_isize=0x0000000000000000" or missing value [ 1208.355682] EXT4-fs (sda1): Unrecognized mount option "deb [ 1208.355682] g_want_extra_isize=0x0000000000000000" or missing value 08:57:37 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[], 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:37 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000000)={0x68, 0x29, 0x2, {0x800, [{{0x0, 0x4, 0x2}, 0x10000, 0x9, 0xb, './bus/file0'}, {{0x40, 0x4, 0x1}, 0x2, 0x43f8283e, 0x5, './bus'}, {{0x8, 0x4, 0x5}, 0xae5, 0x7f, 0x5, './bus'}]}}, 0x68) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'deb#g_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x3000000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:37 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) [ 1208.681316] EXT4-fs (sda1): Unrecognized mount option "deb#g_want_extra_isize=0x0000000000000000" or missing value 08:57:37 executing program 1: r0 = open(&(0x7f0000000240)='./bus\x00', 0x200000, 0xfffffffffffffffc) connect$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x4, 0x3ff, 0x4, "122aa55da048b11bd1f7c99351c91765d2f95a408ed5bb271799111a4c720c5e2f2ef3e6062dc930c80e60ed4b86fc0d2f313eb335cb2c5586beda94cfffc2", 0xf}, 0x60) stat(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)) splice(r0, &(0x7f0000000000), r0, &(0x7f0000000040), 0xfffffffffffffffd, 0x4) 08:57:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x4000000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 1208.825813] EXT4-fs (sda1): Unrecognized mount option "deb#g_want_extra_isize=0x0000000000000000" or missing value 08:57:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'deb%g_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:37 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) getsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @multicast2}, &(0x7f0000000040)=0x8) [ 1209.170132] EXT4-fs (sda1): Unrecognized mount option "deb%g_want_extra_isize=0x0000000000000000" or missing value [ 1209.326314] EXT4-fs (sda1): Unrecognized mount option "deb%g_want_extra_isize=0x0000000000000000" or missing value 08:57:38 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[], 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x8000000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:38 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e22, @rand_addr=0xfffffffffffffffc}}, 0x5f, 0x0, 0x2, 0x7, 0x8}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000180)={r1, 0x100}, &(0x7f00000002c0)=0x8) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @aes128, 0x2, "eb0b7f617a4a06b6"}) syz_open_dev$video4linux(&(0x7f0000000340)='/dev/v4l-subdev#\x00', 0xc3, 0x40000) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/245) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000000540)) 08:57:38 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'deb*g_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:38 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0xa000000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1209.781210] EXT4-fs (sda1): Unrecognized mount option "deb*g_want_extra_isize=0x0000000000000000" or missing value 08:57:38 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) mknod(&(0x7f0000000000)='./bus\x00', 0x80, 0x8) 08:57:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0xe000000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:38 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000140)='./bus\x00', &(0x7f00000000c0)) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000000)) syz_open_pts(r0, 0x80) [ 1209.969443] EXT4-fs (sda1): Unrecognized mount option "deb*g_want_extra_isize=0x0000000000000000" or missing value 08:57:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0xf000000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'deb+g_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\xff', 0x0, 0x0, 0x0) 08:57:39 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, 0x0, 0x0) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:39 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[], 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:39 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./bus\x00', r0}, 0x10) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000140)={0x7ff, 0xf4c, r1, 0x0, r2, 0x0, 0x4, 0x3}) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000080)) [ 1210.537515] EXT4-fs (sda1): Unrecognized mount option "deb+g_want_extra_isize=0x0000000000000000" or missing value 08:57:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x10000000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:39 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x400040, 0x18) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) [ 1210.683951] EXT4-fs (sda1): Unrecognized mount option "deb+g_want_extra_isize=0x0000000000000000" or missing value 08:57:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'deb-g_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x60000000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:39 executing program 1: open(&(0x7f0000000100)='./bus\x00', 0x101000, 0x2) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) lstat(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)) 08:57:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x9effffff, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:39 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./bus\x00', 0x9, 0x4, &(0x7f0000000300)=[{&(0x7f0000000080)="ad152257e93938b40d1cc01f84d92c6fd3d05ede42ed9639df35554ead9a63cb579569a63695b700509d36dd1fd2bb47e99ce711dd8a954aace9ac4c738933b51f728931a6464775cdd0252956", 0x4d, 0x3fb3}, {&(0x7f0000000100)="49af02593e64af98172626a188452db00a91efed45eb875ad5da6fa47b7b944b6b3d5658e975468d696c6c900a58513f5f42cbf25b11086b37753bfae16a62961672f2c5bb60ac9005f3dc69c3bf3f5421642986496da1", 0x57, 0x5}, {&(0x7f0000000200)="8bf50e0d65a1f8874cb74626516cb755da30874a811e332b9b56a33360fc857e5758b009c307614fbce258c5eaa87a22b15c67200687838e3ac74041d8b061287480703b7d399731e0ec041092e10cefa76eb58f86f3be52496227a1b01eebeaf842bed6ba4bb2cbdd259da6d38f36c6324c5522fea00ecc7282361da59ffa17cc20dbafd97d4fdc0f335bad34e124318fbaf1af9d54daee07a379d11e48762ca8d80cfba05660ebd5633954a202cfcf02e309a98e292aa458e0637a2e090674f8d73e32eae528bc211b0d6800fcfdba418f2708e7849fabc141503c9431624b31470e1e2a3f621fc0b131440b4ce626896c3bcf68", 0xf5, 0xaf}, {&(0x7f0000000180)="31a1d0760480d459e68c", 0xa}], 0x2020, &(0x7f0000000380)={[{@quota='quota'}], [{@measure='measure'}, {@euid_eq={'euid', 0x3d, r0}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x64, 0x38, 0x73, 0x79, 0x3f, 0x77, 0x36], 0x2d, [0x75, 0x63, 0x33, 0x7f], 0x2d, [0x34, 0x65, 0x77, 0x36], 0x2d, [0x66, 0x7f, 0x73, 0x77], 0x2d, [0x33, 0x77, 0x39, 0x37, 0x0, 0x39, 0x0, 0x30]}}}, {@fsuuid={'fsuuid', 0x3d, {[0x71, 0x3c, 0x38, 0x67, 0x75, 0x34, 0x38, 0x75], 0x2d, [0x33, 0x3d, 0x33, 0x33], 0x2d, [0x37, 0x33, 0x62, 0x39], 0x2d, [0x0, 0x62, 0x3f, 0x37], 0x2d, [0x39, 0x0, 0x77, 0x32, 0x3b, 0x0, 0x35, 0x7f]}}}, {@smackfsroot={'smackfsroot', 0x3d, 'vboxnet0system'}}, {@euid_eq={'euid', 0x3d, r0}}]}) 08:57:40 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300), 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf6a0ba9b9448aebba376c0a75df6ce2aee3f27315d2ab8d25f92e6990056e0207fe4d451b62624a1be93d69512dff2d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7bea3ae603def7f99defee0f55dd287483e308bfa8d9f93b69b2f3b7e0916d4adb266df3240872fc4c9f5e8d86a973d9a63739156f1cc80ce2dd29dda28a539929a959fe736c0c41515562f7c7d97db6fa2fd8707d74be4c049e0acc305aa95eeae1cef4a1a68b6deb1b9b"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'deb.g_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0xbc0e0000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:40 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:40 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0xf0ffffff, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:40 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x200000, 0x24) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'deb0g_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:40 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x200000, 0x79) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0xfffff000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:40 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300), 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:40 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x800, 0x22) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) 08:57:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0xffffff7f, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:40 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) setsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000), 0x4) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0xbc31921, 0x3, 0x7f, 0x40}, 0x8) 08:57:41 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0xffffff9e, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debXg_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:41 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000800)=@broute={'broute\x00\x00\x00\x00`\x00', 0x4000, 0x0, 0x90, [], 0x0, 0x0, &(0x7f0000000680)=[{}, {}, {}]}, 0x108) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000000)={'caif0\x00', {0x2, 0x4e23, @multicast2}}) 08:57:41 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000100)) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000200)=ANY=[@ANYBLOB="f362df7ab84e3e15e96fc97b725d977489f8f67de45a730132aefb9c1931312c9e65a299de503fc726aa5eb4870000000000000000f13920813860b089ad955e000001000000060000000000"], &(0x7f0000000180)=0x24) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) ptrace$setregset(0x4205, r1, 0x202, &(0x7f00000000c0)={&(0x7f0000000040)="b3fa1c31237fe16cd7a991c24eb705eb5bcd6e1cd0abc386e3014ffc2e28eb27f3f96b1f34bcf76e62d56ed259ec7a5f57038c4a09f8342cd9ac6185990384eb77b5d1caa570e7785426a4b1c795267a4a", 0x51}) recvmmsg(r0, &(0x7f00000031c0)=[{{&(0x7f00000003c0)=@tipc=@name, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)=""/85, 0x55}], 0x1, &(0x7f00000015c0)=""/43, 0x2b}, 0x4d9}, {{&(0x7f0000001600)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000001700)=[{&(0x7f0000001680)=""/41, 0x29}, {&(0x7f00000016c0)=""/29, 0x1d}], 0x2, &(0x7f0000001740)=""/138, 0x8a}, 0xd3}, {{&(0x7f0000001800), 0x80, &(0x7f0000001c00)=[{&(0x7f0000001880)=""/136, 0x88}, {&(0x7f0000001940)=""/160, 0xa0}, {&(0x7f0000001a00)=""/72, 0x48}, {&(0x7f0000001a80)=""/197, 0xc5}, {&(0x7f0000001b80)=""/111, 0x6f}], 0x5}, 0x81}, {{0x0, 0x0, &(0x7f0000002ec0)=[{&(0x7f0000001c80)=""/35, 0x23}, {&(0x7f0000001cc0)=""/217, 0xd9}, {&(0x7f0000001dc0)=""/44, 0x2c}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000002e00)=""/101, 0x65}, {&(0x7f0000002e80)=""/48, 0x30}], 0x6, &(0x7f0000002f40)=""/143, 0x8f}, 0x4}, {{0x0, 0x0, &(0x7f0000003080)=[{&(0x7f0000003000)=""/120, 0x78}], 0x1, &(0x7f00000030c0)=""/234, 0xea}, 0x80000000}], 0x5, 0x10141, &(0x7f0000003300)={0x77359400}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000003340)={'veth1\x00', r2}) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r3, r4) 08:57:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:57:41 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300), 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf6a0ba9b9448aebba376c0a75df6ce2aee3f27315d2ab8d25f92e6990056e0207fe4d451b62624a1be93d69512dff2d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7bea3ae603def7f99defee0f55dd287483e308bfa8d9f93b69b2f3b7e0916d4adb266df3240872fc4c9f5e8d86a973d9a63739156f1cc80ce2dd29dda28a539929a959fe736c0c41515562f7c7d97db6fa2fd8707d74be4c049e0acc305aa95eeae1cef4a1a68b6deb1b9b"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0xfffffff0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debcg_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\xe0', 0x0, 0x0, 0x0) 08:57:41 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:41 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x3000000000000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:41 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @initdev}, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) setresuid(r1, r2, r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$NBD_SET_TIMEOUT(r4, 0xab09, 0xffff) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000080)) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f0000000040)={0x3, r4}) 08:57:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debdg_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x2, 0x0) 08:57:41 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(0x0, 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) [ 1213.297182] EXT4-fs: 10 callbacks suppressed [ 1213.297194] EXT4-fs (sda1): Unrecognized mount option "debdg_want_extra_isize=0x0000000000000000" or missing value 08:57:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x40030000000000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:42 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000000)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000040)={r1}) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000140)) pivot_root(&(0x7f0000000080)='./bus/file0\x00', &(0x7f00000000c0)='./bus/file0\x00') connect$caif(r0, &(0x7f0000000100)=@dbg={0x25, 0x5, 0x1}, 0x18) 08:57:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x4, 0x0) 08:57:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0xf0ffffffffffff, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:42 executing program 1: open(&(0x7f0000000040)='./bus\x00', 0x4c0100, 0x20) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x6, 0x0) [ 1213.665911] EXT4-fs (sda1): Unrecognized mount option "debdg_want_extra_isize=0x0000000000000000" or missing value 08:57:42 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d9"], 0x130) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x100000000000000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xc, 0x0) 08:57:42 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x400000, 0x0) stat(&(0x7f0000000040)='./bus\x00', &(0x7f0000000540)) fdatasync(r0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x28400}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r1, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0xd513, {0x7ff, 0x80000000, 0x1f, 0x100, 0x32bb8d2c, 0x2}, 0x7, 0x2b}, 0xe) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) 08:57:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debig_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:42 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(0x0, 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) [ 1214.163603] EXT4-fs (sda1): Unrecognized mount option "debig_want_extra_isize=0x0000000000000000" or missing value 08:57:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x200000000000000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:43 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x4) unlinkat(r0, &(0x7f0000000000)='./bus\x00', 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000040)) ioctl$TIOCNOTTY(r0, 0x5422) 08:57:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xd, 0x0) [ 1214.275786] EXT4-fs (sda1): Unrecognized mount option "debig_want_extra_isize=0x0000000000000000" or missing value 08:57:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x300000000000000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'deblg_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x12, 0x0) [ 1214.572119] EXT4-fs (sda1): Unrecognized mount option "deblg_want_extra_isize=0x0000000000000000" or missing value [ 1214.663960] EXT4-fs (sda1): Unrecognized mount option "deblg_want_extra_isize=0x0000000000000000" or missing value 08:57:43 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x130) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xe0, 0x0) 08:57:43 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f0000000200)={0x9, @capture={0x1000, 0x1, {0x80, 0x2}, 0x4, 0xfff}}) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/124) 08:57:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x400000000000000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debog_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:43 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(0x0, 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) [ 1215.087322] EXT4-fs (sda1): Unrecognized mount option "debog_want_extra_isize=0x0000000000000000" or missing value 08:57:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x600, 0x0) 08:57:43 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x501}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r1, 0x220, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6df}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000010}, 0x80) 08:57:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x800000000000000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0xa00000000000000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:44 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L+', 0x5}, 0x28, 0x1) shmget(0x0, 0x600000, 0x1, &(0x7f0000a00000/0x600000)=nil) sched_yield() [ 1215.287395] EXT4-fs (sda1): Unrecognized mount option "debog_want_extra_isize=0x0000000000000000" or missing value 08:57:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xc00, 0x0) 08:57:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xd00, 0x0) 08:57:44 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debpg_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0xe00000000000000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:44 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x8000007, 0x400000) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000040)) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000080)=0x7fff, &(0x7f00000000c0)=0x2) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='westwood\x00', 0x9) statx(r0, &(0x7f0000000180)='./bus\x00', 0x100, 0x20, &(0x7f0000000280)) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000000)={0x7f}) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f0000000200)={0x9, "ef27cf2593ecf1bc32a01d40931274ea8029eeeed5b9e1ed0f780c5b635b063c", 0x1000, 0x0, 0x3, 0xc, 0x1}) 08:57:44 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x130) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:44 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0xf00000000000000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1216.013036] EXT4-fs (sda1): Unrecognized mount option "debpg_want_extra_isize=0x0000000000000000" or missing value 08:57:44 executing program 1: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x40) ioctl$BLKRAGET(r0, 0x1263, &(0x7f00000003c0)) r1 = open(&(0x7f0000000040)='./bus\x00', 0x101000, 0x100000000000002) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000325bd7000fbdbdf2512000000540004003c000700080004000358e8fb61f0bf000000080002000000000008000d00040000000800040006000000080001001a0000000800010008000000080002000104000014000700080003000300000008000100130000000aec52946a8f0fbe5e0e2fc154bf52759451f2abf3099aec44a5c808b5eb65ff535a8aa347b5153d4932e78097e468ca58f8a367f40a4903dee78c402356208f47485dd8058aff722cf60e0242fadd6d3afa98c196031c8d9855000000000000000000"], 0x68}, 0x1, 0x0, 0x0, 0x811}, 0x1) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) r3 = getpid() perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x3, 0x0, 0x44f, 0x101, 0x0, 0x8, 0x400, 0x1, 0xfffffffffffffffb, 0x9b91, 0x20, 0x33, 0x3, 0x8000, 0x908a, 0x2, 0x2, 0x6, 0x1, 0x2, 0xb53e3ee, 0x1dc, 0x9, 0x1, 0x4, 0x2, 0x4, 0x8, 0x3f, 0x3, 0x0, 0x9, 0x7, 0x2, 0x7, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000200), 0x2}, 0x400, 0x80, 0x1, 0x7, 0x8000, 0x8000, 0x8001}, r3, 0x8, r0, 0x4ebec415f8d0931f) ioctl$BLKRAGET(r1, 0x1263, &(0x7f0000000240)) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) 08:57:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x1200, 0x0) [ 1216.158531] EXT4-fs (sda1): Unrecognized mount option "debpg_want_extra_isize=0x0000000000000000" or missing value [ 1216.178358] audit: type=1804 audit(1546592264.929:72): pid=8945 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir412989208/syzkaller.Q5or3D/1609/bus" dev="sda1" ino=16650 res=1 08:57:45 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v1={0x1000000, [{0x80000001, 0x4}]}, 0xc, 0x2) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) fcntl$setown(r0, 0x8, r1) 08:57:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x1000000000000000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:45 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debsg_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 1216.281569] audit: type=1804 audit(1546592264.929:73): pid=8945 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir412989208/syzkaller.Q5or3D/1609/bus" dev="sda1" ino=16650 res=1 08:57:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x2000, 0x0) 08:57:45 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x0, {0x4, 0x0, 0xffffffff, 0xe23d, 0x9, 0x6}}) [ 1216.420505] audit: type=1804 audit(1546592264.929:74): pid=8947 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir412989208/syzkaller.Q5or3D/1609/bus" dev="sda1" ino=16650 res=1 08:57:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x6000000000000000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x3f00, 0x0) 08:57:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x9effffff00000000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:45 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r0, 0x0, 0x14, &(0x7f00000000c0)='\\mime_type#.keyring\x00'}, 0x30) syz_open_dev$ndb(&(0x7f0000000140)='/dev/nbd#\x00', 0x0, 0x22700) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8, 0x5, 0x6, 0x81, 0x0, 0x3, 0x8000, 0x2, 0x0, 0x4bdb, 0x4, 0x7, 0x7, 0x9, 0x2, 0x8000, 0x5, 0x1f, 0x1, 0x5, 0x4, 0x40000000005, 0x401, 0x47, 0x2, 0x100000000, 0xce6, 0x2000000001, 0x0, 0xfffffffffffffffd, 0x40, 0x7, 0xfffffffffffffffb, 0x0, 0x800, 0xc4a, 0x0, 0x80000000, 0x5, @perf_bp={&(0x7f0000000000), 0x1}, 0x22100, 0x1, 0x3, 0x4, 0x2a, 0x80000, 0x2}, r1, 0x4, 0xffffffffffffff9c, 0x2) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r0, 0x400454ce, r2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='/dev/nbd#\x00', r0}, 0x10) 08:57:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xe0ff, 0x0) 08:57:45 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debxg_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:45 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:45 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1c8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xff01, 0x0) 08:57:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0xbc0e000000000000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x100009) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000040)=0x8) 08:57:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0xf0ffffff00000000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:45 executing program 1: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) readlinkat(r0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)=""/156, 0x9c) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) 08:57:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xff0f, 0x0) 08:57:46 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'deb\x85g_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xffe0, 0x0) 08:57:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0xffffff7f00000000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:46 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000000)={'ip6erspan0\x00', {0x2, 0x4e22, @loopback}}) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:46 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0xfffffffffffff000, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x23c01, 0x0) 08:57:46 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000040)='./bus\x00', &(0x7f0000000540)) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000000)={0x6, 0x200}) 08:57:46 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1c8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:46 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debu\n_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000640)={0x6c, r1, 0x201, 0x0, 0x0, {0x2}, [@TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_NAME={0x4e, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @remote}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @loopback={0xff0f000000000000}}}}}]}]}, 0x6c}}, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x2, 0x100) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) r3 = geteuid() getgroups(0x5, &(0x7f0000000140)=[0xee01, 0xffffffffffffffff, 0x0, 0x0, 0xee00]) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r5, 0x800, 0x70bd28, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x80) lchown(&(0x7f0000000100)='./bus\x00', r3, r4) modify_ldt$read(0x0, &(0x7f0000000200)=""/81, 0xfffffcd0) 08:57:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x1000000, 0x0) 08:57:46 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:46 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debu\x85_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:46 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x200) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000200)=""/203) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) stat(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000040)) 08:57:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x13c0200, 0x0) 08:57:47 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000000)=[0x9b, 0x81]) stat(&(0x7f0000000040)='./bus\x00', &(0x7f0000000540)) r1 = shmget$private(0x0, 0x4000, 0x4, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_RMID(r1, 0x0) 08:57:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1218.363567] EXT4-fs: 9 callbacks suppressed [ 1218.363580] EXT4-fs (sda1): Unrecognized mount option "debu…_want_extra_isize=0x0000000000000000" or missing value 08:57:47 executing program 1: open(&(0x7f0000000040)='./bus\x00', 0x301000, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x2000000, 0x0) 08:57:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug\nwant_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:47 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf830ba9b9448aebba376c0a75dff27315e9ab8d25f92e6990056e0207fe4d451b62624a1be93d6951b9c42d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca27"], 0x1c8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 1218.790185] EXT4-fs (sda1): Unrecognized mount option "debug [ 1218.790185] want_extra_isize=0x0000000000000000" or missing value 08:57:47 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x0) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:47 executing program 1: r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x6, 0x8600) ioctl(r0, 0xfff, &(0x7f0000000100)="bff3e246a45604eed31fc63002c6bb3799b206205a6043ce1407cd714dc64013e6505e40800ae86f031cce96bc5d5215bb4390be9f2aac50db77f1fc3596153c3f9f4bcd865768b16630c41310e8dc23bf5ba829ed09608b5b84abc89af038f8ca79a9801deb57acf968586e76c092901ef87c0d308627b214b6ffd5d8b0f935e5215c450defb1789a2bbddb283323d5ce6271f78ca766f4ed9fc941445a375b76fac1e49074bbcf3570d197cb44803566e136f6ede0d8dc1782dc69") getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000200), &(0x7f0000000240)=0x8) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000280)=""/65, &(0x7f0000000300)=0x41) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000000)) restart_syscall() 08:57:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x4000000, 0x0) 08:57:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1218.983884] EXT4-fs (sda1): Unrecognized mount option "debug [ 1218.983884] want_extra_isize=0x0000000000000000" or missing value 08:57:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x6000000, 0x0) 08:57:47 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) mount$9p_virtio(&(0x7f0000000000)='\x00', &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='9p\x00', 0x3800000, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e733d76697274696f2c756e616d653d2c657569643e70573e811117464b846736d3286a4b7507122952bfa85938cddfcdb4d047fdb719d7b197e214366a7b8b647a71d9ba810679cbc6dee256d70a965420e26b870eda5a01a47f4957000000000000000000", @ANYRESDEC=r1, @ANYBLOB="2c736d61636b66736861743d6273656375726974795e2e5e2ec95b2c6f626a5f726f6c653d2c6f626a5f726f6c653d2f747275737465646b657972696e672c686173682c726f6f74636f6e746578743d73797374656d5f752c6d61736b3d4d41595f57524954452c7063723d30303030303030303030303030303030303030322c00"]) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e20, 0x6, @mcast1}}, 0x6, 0x7, 0x4, 0x95, 0x42}, &(0x7f0000000300)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000440)={0x6, 0x8000, 0x8, 0x6, r2}, 0x10) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug\x85want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xc000000, 0x0) [ 1219.136230] 9pnet_virtio: no channels available for device [ 1219.167180] 9pnet_virtio: no channels available for device 08:57:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:48 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x6, 0x0) r1 = openat(r0, &(0x7f0000000040)='./bus\x00', 0x100, 0x10) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000240)={0x4, 0x9, 0xffffffff, 0x9, 0x6, 0x4}) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000280)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f00000002c0)={0x5, 0x6, 0x10001, 0x7fffffff, 0xfb1d}) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x10001, 0x30}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={r3, @in6={{0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0x25}, 0x1}}, 0x2, 0x8, 0x100, 0x10001, 0x1}, &(0x7f0000000200)=0x98) [ 1219.254601] EXT4-fs (sda1): Unrecognized mount option "debug…want_extra_isize=0x0000000000000000" or missing value [ 1219.359970] EXT4-fs (sda1): Unrecognized mount option "debug…want_extra_isize=0x0000000000000000" or missing value 08:57:48 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf830ba9b9448aebba376c0a75dff27315e9ab8d25f92e6990056e0207fe4d451b62624a1be93d6951b9c42d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7b"], 0x214) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:48 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xd000000, 0x0) 08:57:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_\nant_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:48 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x200, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:48 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000540)) 08:57:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x12000000, 0x0) [ 1219.921814] EXT4-fs (sda1): Unrecognized mount option "debug_ [ 1219.921814] ant_extra_isize=0x0000000000000000" or missing value 08:57:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x20000000, 0x0) 08:57:48 executing program 1: stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) setxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v2={0x2000000, [{0x1, 0x401}, {0x20, 0x4}]}, 0x14, 0x2) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000100)={{0xfff, 0x4}, 'port0\x00', 0x10, 0x40, 0x8, 0x7, 0x2, 0x9, 0x1, 0x0, 0x0, 0x1}) [ 1220.085023] EXT4-fs (sda1): Unrecognized mount option "debug_ [ 1220.085023] ant_extra_isize=0x0000000000000000" or missing value 08:57:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:49 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf830ba9b9448aebba376c0a75dff27315e9ab8d25f92e6990056e0207fe4d451b62624a1be93d6951b9c42d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7b"], 0x214) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:49 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf6a0ba9b9448aebba376c0a75df6ce2aee3f27315d2ab8d25f92e6990056e0207fe4d451b62624a1be93d69512dff2d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7bea3ae603def7f99defee0f55dd287483e308bfa8d9f93b69b2f3b7e0916d4adb266df3240872fc4c9f5e8d86a973d9a63739156f1cc80ce2dd29dda28a539929a959fe736c0c41515562f7c7d97db6fa2fd8707d74be4c049e0acc305aa95eeae1cef4a1a68b6deb1b9b"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x3f000000, 0x0) 08:57:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_\x85ant_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:49 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000000)='./bus\x00', &(0x7f0000000540)) 08:57:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:49 executing program 1: mkdir(&(0x7f0000000000)='./bus\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) [ 1220.581838] EXT4-fs (sda1): Unrecognized mount option "debug_…ant_extra_isize=0x0000000000000000" or missing value 08:57:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x8bffffff, 0x0) [ 1220.699935] EXT4-fs (sda1): Unrecognized mount option "debug_…ant_extra_isize=0x0000000000000000" or missing value 08:57:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:49 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) syz_extract_tcp_res(&(0x7f0000000000), 0x200, 0x80000000) r0 = getpgid(0x0) ptrace$setsig(0x4203, r0, 0x1f, &(0x7f0000000040)={0x3, 0x7, 0x2}) 08:57:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x8cffffff, 0x0) 08:57:50 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x214) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:50 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_w\nnt_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:50 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) r1 = getpid() sched_getattr(r1, &(0x7f0000000040), 0x30, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000000)={0xfffffffffffff001, 0x8320b}) mkdir(&(0x7f00000000c0)='./bus\x00', 0xe8) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000080)={0x17, 0x1000, &(0x7f00000005c0)="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"}) 08:57:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xe0ffffff, 0x0) 08:57:50 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1221.490374] EXT4-fs (sda1): Unrecognized mount option "debug_w [ 1221.490374] nt_extra_isize=0x0000000000000000" or missing value 08:57:50 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000080)=0x1) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) 08:57:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xe4ffffff, 0x0) 08:57:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:50 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) rt_sigreturn() stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') r2 = fcntl$getown(r0, 0x9) timer_create(0x5, &(0x7f0000000180)={0x0, 0xa, 0x0, @tid=r2}, &(0x7f0000000200)) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f00000000c0)={0x34, 0x0, &(0x7f0000000080)}) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="54010000a4790f782ccaeece0fe7a75734b250a6da7ad75837c876fa9583948f7e11a8d600a6e2e99952700b7cf283f1328d8592f110d391c8df7649333aa915d3bbf9bf9353a4b7980be725a678d1ea9c24fa4697ebfdba8adeec212b1131fa90e07faa03a484a8ebe0cfc197243615832a1d4e6a2e0c0a1812666479070283e5ca828472940a4fc700f9d38388c014e7caf1fe73f59b561edbe6ac1f079dcbdf56b56f7588d612b2385e1101a06296c8430adde6c40f", @ANYRES16=r1, @ANYBLOB="000329bd7000fedbdf25050000000c00030009000000000000000c00040041000000000000001c00070008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB='\f\x00\b\x00%3\x00\x00\x00\x00\x00\x00'], 0x54}, 0x1, 0x0, 0x0, 0x10}, 0x814) getsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000002c0)=""/207, &(0x7f0000000040)=0xcf) 08:57:50 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_w%nt_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:51 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xf6ffffff, 0x0) 08:57:51 executing program 1: open(&(0x7f0000000100)='./bus\x00', 0x800, 0x8) mkdir(&(0x7f0000000000)='./bus\x00', 0x126) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf830ba9b9448aebba376c0a75dff27315e9ab8d25f92e6990056e0207fe4d451b62624a1be93d6951b9c42d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7bea3ae603def7f99defee0f55dd287483e308bfa8d9f93b69b2f3b7e0916d4adb266df3240872"], 0x23a) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_w\x85nt_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:51 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x80) 08:57:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xfeffffff, 0x0) 08:57:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_wa\nt_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1222.665642] audit: type=1804 audit(1546592271.419:75): pid=9383 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir412989208/syzkaller.Q5or3D/1634/bus" dev="sda1" ino=17832 res=1 08:57:51 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) r2 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, 0xfffffffffffffffd) mount$bpf(0x0, &(0x7f0000000080)='./bus/file0\x00', &(0x7f00000000c0)='bpf\x00', 0x800000, &(0x7f00000005c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303010303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030302e22f9dd30303030343731322c6d6f64653d3030303030a416429c4452315402ac0d893030303030303030303030303030303031302c6f62", @ANYRESDEC=r1, @ANYBLOB=',uid>', @ANYRESDEC=r2, @ANYBLOB=',fowner<', @ANYRESDEC=r3, @ANYBLOB=',peUmit_directio,fowner<', @ANYRESDEC=r4, @ANYBLOB=',appraise,mask=^MAY_APPEND,\x00']) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000040), 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x1f, 0x0, 0x400, 0x21, r0, 0xfb}, 0x2c) linkat(r0, &(0x7f0000000180)='./bus\x00', r0, &(0x7f0000000700)='./bus/file0\x00', 0x1000) [ 1222.716263] audit: type=1804 audit(1546592271.439:76): pid=9383 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir412989208/syzkaller.Q5or3D/1634/bus" dev="sda1" ino=17832 res=1 [ 1222.755117] audit: type=1804 audit(1546592271.439:77): pid=9388 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir412989208/syzkaller.Q5or3D/1634/bus" dev="sda1" ino=17832 res=1 08:57:51 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xff010000, 0x0) 08:57:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:51 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000000)={0xc, 0xffffffff, {0x51, 0x1, 0x39f, {0x3, 0x7}, {0x2, 0x2}, @const={0x9, {0x10001, 0x1, 0x9, 0x400}}}, {0x51, 0x0, 0x1, {0x3ff, 0x5}, {0x1f, 0x8}, @rumble={0x80000001, 0x431}}}) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000080)={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x6}, 0x7a, {0x2, 0x4e23, @multicast1}, 'bcsh0\x00'}) 08:57:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x23a) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xff0f0000, 0x0) 08:57:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_wa%t_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:52 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141043, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0x401, 0x8006, 0x1f}, &(0x7f00000000c0)=0x10) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000200)=""/134) setresuid(r1, r1, r1) 08:57:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xffffff7f, 0x0) 08:57:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:52 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f00000000c0)=0x7b) [ 1223.497983] EXT4-fs: 7 callbacks suppressed [ 1223.497998] EXT4-fs (sda1): Unrecognized mount option "debug_wa%t_extra_isize=0x0000000000000000" or missing value [ 1223.697956] EXT4-fs (sda1): Unrecognized mount option "debug_wa%t_extra_isize=0x0000000000000000" or missing value 08:57:52 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0xa}}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r3 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r3, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:52 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f0000000000)={0x9, "1cd35ac4c17e15d22d6be77f13164672259ace96ea28cf517ce4023a055f980d", 0x2, 0x4, 0x1, 0x8000, 0x1, 0x3, 0x62b68b95, 0x40}) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xffffff8b, 0x0) 08:57:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_wa\x85t_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:53 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000000)=@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:53 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x23a) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xffffff8c, 0x0) [ 1224.323555] EXT4-fs (sda1): Unrecognized mount option "debug_wa…t_extra_isize=0x0000000000000000" or missing value 08:57:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xffffffe0, 0x0) 08:57:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1224.427429] EXT4-fs (sda1): Unrecognized mount option "debug_wa…t_extra_isize=0x0000000000000000" or missing value 08:57:53 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000040)='./bus\x00', &(0x7f0000000540)) 08:57:53 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0xa}}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r3 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r3, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf6a0ba9b9448aebba376c0a75df6ce2aee3f27315d2ab8d25f92e6990056e0207fe4d451b62624a1be93d69512dff2d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7bea3ae603def7f99defee0f55dd287483e308bfa8d9f93b69b2f3b7e0916d4adb266df3240872fc4c9f5e8d86a973d9a63739156f1cc80ce2dd29dda28a539929a959fe736c0c41515562f7c7d97db6fa2fd8707d74be4c049e0acc305aa95eeae1cef4a1a68b6deb1b9b"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_wan\n_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xffffffe4, 0x0) 08:57:53 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000100)=0x4, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) readahead(r1, 0xbf8, 0x3) syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x7, 0x40) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) [ 1224.858027] EXT4-fs (sda1): Unrecognized mount option "debug_wan [ 1224.858027] _extra_isize=0x0000000000000000" or missing value 08:57:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:53 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x101) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) [ 1225.004272] EXT4-fs (sda1): Unrecognized mount option "debug_wan [ 1225.004272] _extra_isize=0x0000000000000000" or missing value 08:57:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xfffffff6, 0x0) 08:57:53 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) recvmsg$kcm(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/161, 0xa1}, {&(0x7f00000001c0)=""/98, 0x62}, {&(0x7f0000000240)=""/77, 0x4d}, {&(0x7f0000000080)=""/51, 0x33}, {&(0x7f00000002c0)=""/49, 0x31}, {&(0x7f0000000300)=""/110, 0x6e}, {&(0x7f0000000380)=""/221, 0xdd}, {&(0x7f00000005c0)=""/244, 0xf4}, {&(0x7f0000000480)=""/155, 0x9b}], 0x9, &(0x7f0000000780)=""/131, 0x83}, 0x100) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000980)) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f00000000c0)=0x7ff, 0x295) 08:57:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_wan%_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:54 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x24d) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:54 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0xa}}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r3 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r3, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) [ 1225.555755] EXT4-fs (sda1): Unrecognized mount option "debug_wan%_extra_isize=0x0000000000000000" or missing value 08:57:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xfffffffe, 0x0) 08:57:54 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000000)={0x2000000000000000, 0x7}) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) getpid() [ 1225.670485] EXT4-fs (sda1): Unrecognized mount option "debug_wan%_extra_isize=0x0000000000000000" or missing value 08:57:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x10000000000, 0x0) 08:57:54 executing program 1: open(&(0x7f0000000140)='./bus/file0\x00', 0x141042, 0x4) mknod(&(0x7f00000000c0)='./bus\x00', 0xc202, 0x209) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) setxattr$security_selinux(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:pinentry_exec_t:s0\x00', 0x25, 0x1) 08:57:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x100000000000000, 0x0) 08:57:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_wanX_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:54 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r1 = msgget(0x0, 0x20) msgctl$IPC_RMID(r1, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000140)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x2000, 0x1}) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000000)={0x1, 0xb, 0x4, 0x0, {0x77359400}, {0x1, 0xc, 0xd060, 0x7, 0x1, 0x7f, "fa806352"}, 0x3f, 0x0, @userptr=0x2, 0x4}) symlink(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./bus\x00') stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1226.064503] EXT4-fs (sda1): Unrecognized mount option "debug_wanX_extra_isize=0x0000000000000000" or missing value 08:57:54 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf830ba9b9448aebba376c0a75dff27315e9ab8d25f92e6990056e0207fe4d451b62624a1be93d6951b9c42d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7bea3ae603def7f99defee0f55dd287483e308bfa8d9f93b69b2f3b7e0916d4adb266df3240872fc4c9f5e8d86a95ad9a6373915cfbd6f1cc80c"], 0x24d) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 1226.246256] EXT4-fs (sda1): Unrecognized mount option "debug_wanX_extra_isize=0x0000000000000000" or missing value 08:57:55 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0xa}}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r3 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r3, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf6a0ba9b9448aebba376c0a75df6ce2aee3f27315d2ab8d25f92e6990056e0207fe4d451b62624a1be93d69512dff2d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7bea3ae603def7f99defee0f55dd287483e308bfa8d9f93b69b2f3b7e0916d4adb266df3240872fc4c9f5e8d86a973d9a63739156f1cc80ce2dd29dda28a539929a959fe736c0c41515562f7c7d97db6fa2fd8707d74be4c049e0acc305aa95eeae1cef4a1a68b6deb1b9b"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x13c020000000000, 0x0) 08:57:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:55 executing program 1: r0 = dup(0xffffffffffffffff) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r1, 0x10, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x8000) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_dccp_buf(r2, 0x21, 0xc0, &(0x7f0000000000)="f4d73ebf9ddb9099926e854f77f32303e44e50a527fba822b04346cf111db4a700d796cc371f66d898d5f0a7bbee2215c466b90c8b4f7066767905ef49793145707974a60aab7a505f6fe7cd08", 0x4d) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) 08:57:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_wan\x85_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:55 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000000)={{{@in=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x8, 0x8}, 'port0\x00', 0x4, 0x1000a, 0xfffffffffffffffd, 0x3f, 0x1fe1, 0x7ff, 0xd6, 0x0, 0x5}) ioprio_set$uid(0x3, r1, 0x5ba4) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x200000000000000, 0x0) 08:57:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x400000000000000, 0x0) 08:57:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:55 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="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"], 0x28}}, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x400000) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f00000002c0)='.deLd\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, r3) 08:57:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x600000000000000, 0x0) 08:57:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want\nextra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:55 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x0, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:55 executing program 1: open(&(0x7f0000000040)='./bus\x00', 0x181100, 0x0) stat(&(0x7f0000000000)='./bus\x00', &(0x7f0000000540)) 08:57:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x24d) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:56 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) write$binfmt_aout(r0, &(0x7f0000001600)={{0x0, 0x3, 0x4, 0x3be, 0xf9, 0x243, 0x380, 0x92}, "717abb89178abde3db7b3fc688be70a32806cbe1c0529ee6232008d5a2217a7388a916af9d0250c62973cf67b2fad42b11aa362878c29dcb36ffc3846de5d7a0778f35288190395e54d2898d7fbd3a8118954a30bf07399b527dde21932cb6d94ff3a1de8090884839d534d2b89b436d46d3a616f62f29bdae50b2c8396bbf8b6ce2d649726dfe66134037649aff76d135bd07323ded29db40efa5d6ff9897b393d7627d76b4ed50a0d5627b4de3b741d8a9306daabe16949f788ff9a2086a5bab22a637f27254a28458981ff050bfce6c56b69085b1a4b8b92e64efe6937e3545f9d35dc8438e4804e3046598c259d85ea94c16237ef4d2a53a1e", [[], [], [], [], [], []]}, 0x71b) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x20801) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000100)={r1, 0x6, 0xfffffffffffffff9, "92b1fd09937129fee8b1d6b4b8272093a67d4695cba37b718d75578dce"}) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x10000, 0xfffffffffffffffe) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f00000005c0)={'nat\x00', 0x1000, "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"}, &(0x7f0000000000)=0x1024) 08:57:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xc00000000000000, 0x0) 08:57:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want\x85extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:56 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x40000000400, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f00000000c0)={0x0, 0xaf, &(0x7f0000000000)="459038cb9a78cc5b8ab652162f2a8ab062ee5eb4a4bd262a42d20592a6ccb207e5517954bc5aee68c6762005c84e91665d9b3f2dc468ca3fd64ef762d9ea406c75d37b66ecf591afc70e0eeb589ba1a4b65f1a8337b9373bac82536835cdeb0b2b5acac1aaaaba2e6274156242cb4563ad0fadc20985d7ac52278d54cb3568103080e2ea6b33a8c91bd4bb91081667d78e8bda497550fb1aa0b6eae329cf8ae551163434cce9f162453e733081ac3e"}) 08:57:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xd00000000000000, 0x0) 08:57:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x1200000000000000, 0x0) 08:57:56 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20404}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x24, r1, 0x400, 0x70bd2c, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x7f}}, ["", "", "", "", ""]}, 0xffffffffffffff3b}, 0x1, 0x0, 0x0, 0x5}, 0x4) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000005c0)="4f0370b6d8b5d9fb8d5b463477a53c540eb2c7e614f5402bd63a197054e0a0a02ea0e5ccea90508aa72d46abda37c46083f533a73772a3af72b26f333d61a737f1745685ebf9b3a013b33cdd85763a17063ce5f086d18823d1a0673accff5bd830c771d504e3a29322bd95b8d987fb2bc3507892341d9cde1ec242cfa3d979e3d5ca4d31a81edd136f3d4402387e2ed9797b7031caeabac5c5b88956c4460801bcddf1ea2958e290e2ca1db6b134ab9e1eae69787c615a5dec2edd887943a41d549925cd711a1db33aa6ef345b0537db20ed85d59c08d68eee8af350da304f2d959c1741478f83d18b632fc2be7b6ce6720986bef16cb9bd78ab240516963303adc4d8f1808bf4eb0f7211fa51ac637534f84f86d957aaaba1c77997943721c3ad8d1b3dedfa6d31505ed0fae4de22e35842ce2caa9bcc0228034ef522532361af8654f755a1aa4c51d9c4818a433a044a4df387feff3d2350594474a920ee067390f23706b6fc13d4348fc6ef71bc8202729a7768aab0549a080f0e0d96e1e9938ac79998fd6c2e457c5e82fc67424422ab19449482081d7fe510c0692573c08841897f1c22865c697b18a3dafcff403d696045525e26ce9c0e24e7775bde66cd80237fdabf2d9fc0993e8a4b83c97bcaa7c1b3223c5085c36a26d11fc739e0a53bc14067a41f3d657c16ce994f804a4836530125715e0db7dc7a64f78b645d49b748f9ef7218f8f52b26cf128157f4c6fdbe3e21e324c578c880347bebf4a7ca9ceb9945d3a5bc10f8ffa17c66219b34b8e2386c1d0078c8f32cfca7fbe4d6b386ae8942b05a49c23e3351aaf0bbee65433e9c5df7ac3959e693ae8b27198a07ba03cc3cd7fbcb7e968ebb1ae575fdb93a76072c47e1d24eeda5e3a78f12eb23e73f8408b8345782e1b4e946d1f765dfc732fe0b3baddee1b4b09ce3a39f33b87831053e47231cd1bbc39536a33d79fc6e311050a54658fdd0b5e5a335d42f07ae3e6429f4f2498b31c7fe6f7287a2b64613589c779d4b620369e263c4669e4617d86ad1ff4fbfc3076d5f504da1b35b156c8b2a2169e5f6efd3da14a2513d283a207d5a080141d8d5932b98a229820cb330c45b49d00526d2b39f13b69fac8eebcb2f583f965e6c67fcdc39b2c715954f7288a21b6193470448dad1cb94b6384bfa29c7efee8cdcf8b6ea7714e156e039459ff6fc6ed3f5e6434ae7ddf469b33d35bf2751e2bcab6ae0e55aef9c4d825741dd23e6839c92f82e22f23ba9238ad47864019a7832301fe889c1c9726b2df214e920d5ba5c5bd0d7d63d6a33a6eb33be87a0b688feb8a5363adf1ea8ea81acff2f047c6a7375162f6cb624aab009efa638c64cb91b8c8c97a4575fb7d7a2a126a60fd9498d519a40d495515c1b2c7ddfab5608a5e2c8c0856549a608894a5f5c6cecda1dcea5d3c7d685c30e29f4e59489aeb17ed3600e93add713e28ea6887f73dc81d69d50fdbd0b877708f60330320a8388e9919e655cfe23dc326953509eed6ca8c45ac992391ba373936c50568fd92dc159c6105dd3e22a5216dced8c4d209a26fda669565cad76db712a0e283234120ff463fe1bb656cb3ed2bb67717c57a24c165b842b9e5bd04e9766ea6ef086b0c9a39395929aaa8914d7dddb6c0de581021341265c1b9085a6a025f1dc7b569a7a1f7c9b8f2282c7f85998ea29d01c7f4cefe1e44b53c161f9a8b0a585793c070047e80904d14a512b2164eb80f6d280a81f0708316f3e34694bdbbfe1262e5f4331cb6e068387a68db63be25e7cebe703e78696785c6809e9dac1027b649bb30ff6ef8a6869fe7ac33c0a9826f5e52ff5097ba416f336e2ac43e93de5eda868ceca62cf17fc2c7d0e19bf3d1689ce8121d44b940847c0c38a7a79812bba70edbb68886237f28a694426ee81bde2bafb97a64fb6e338e7847b8f3e160d09a7299b68d57cfc82f54f9f5e7ddd3eed8e7ee2141b36b2bbc90d6aea61a632a1d49639ab83c38107d80e98632cb55df692a2125dea98dd6c6b751dca1028d695d5d4708eef39dc4793a466fd805f367b7252084e1463ded9095fbc620cd61fe8f86d62099a4bc531adb1fd472b07e6629c238a9ddae13726c386fb4eac3864e5f86df9da4f27f1bb3107a7d478cdd3cb46031aa08c9c46dcc0f1d933a26fa1e61da16f029f2bcdb23c86b1d45b6e02ab69171d826c05bad42022257346fa3e5ebc32e81095083bbb4a969a83e58b638bfd82b15b1bfc0feb917dda29463d1cc2dfd727039c0b196d9166cc13c5d9de98a74a0a8a0e5b2a0e774d776e1bd41647916b796a075d49900ffb670a35c79681e528ff39b8d23907096c589662ae104970166773b38093b0dea540d43eb245200d7d5b937516fd9cab4ca104b48345362354fbd96d476bbf96be8bfab79c76f62ffbd217f7469689bd6f15910ba8926b8e81476c4c301a34a5483277c97e52778b4484bd8ec5ea2002fc48633199f86d1366c61e326c7be2b0d75dd82a18454a66fa803a00ac428140d8a8cdc655482a65c123963b1cbec8a4b94b721dcb3fbd656a9050e6eb7f8e13362e6179e0e73eb2695f068c70d604264b44895fc7f011de6451f019c77879efb4e17543c6b291eb41b37cca228096921e34160ca5b908a9e3bead9a146882767a408d16413d794cb640fa1476c528893a8a820641cafc768774f50e1d518073bc3e50471bb53fe9b4f26108cfce6685188617d47837dfcb91eab307bbc754746920b9556a6cb50dc9e5e3f5ac088706f07290857266ff32bafb4b8f507f5344124eca11c5a61d1fcb63a793f4c88bd95dcd936f4a9520ea709662a2feebe3411033931dfc20270ec4f007800fcdc32f9a6075198f8f8a0f25c3b1b60fd9e757cda26d0100ae1a1fd7897073dcf3d625a7d5282cfdd1bb7d6e0f37fa1af6c728601c58483db4382ac7732a9cab1c2d40117d59695f4384623d0639e7c4979a8a219af1c2c4ace87ed73ea0170a82aa8197885a421691f89505e1401910fe40886b52d685ad8cd6a918e55ed967c7a509284e9cfc18eca7916939adffce4be54aaeaed17c459f862e5e970afd4ad99c160e4023dcaaa7b2c19b100e5e18bb60e46042cd54f03b17b6f29587bf212958ba407de592330213ff1854f43f1fbb80d47d5e8d649cb9f76bab2402a9d8e08f4eab1c8392a7468b461f041c7accfcd2f831f42f427f93063752e449e236afc98982e47146631c2da46957661d7dac790fd19e14f85ec6b3df0bfe30f822cf70a5e3c85a0a77f6de16f1ee81b60966b1453b38e0d0be685f3dc4da5b67144f9b105ad7e6d69bb5407daf8502f086cc1e298874aff361cd56ea295b39a662a64872e7f9c409080e12e3fe123e4c5a8bc38229644faf8b41f6b9b89c1d5cd7d9a2fad4dd70a2c56bf1403a69cb4958f6dadb388ac87ce3579f11f070c51ed6d371318f380e986d567eea7f4fb0d276c3c850f78483ea8e3c92f37518db30deaf4d7f18764f730ef9e4fa75a02f9b28a3a0d3fbcd9326d0ad4eca4012686a054744bb5f0065cf2f982f7edfa13320fa59544c8dfc649f47e6304039810deb493281eb7f49c8a8795e5f982105eb05aa8a2333aa3b3adbb2182af78a4d4d122604b269816124875f5df86dda578e8078751383f3aed920b09516a97a9882757f953f0e13cea82a66de52d0d3267c5a53f891ab43eef5e2f6c2c3046db60511be4afcb889fd8e3e82ecdc7cadda12487f49fe151555fbc5b8232dea6d6e851b4030b06a5751904c8047be64c8f09638539f0103162c26ae57fd95b9b4650577658536eb5991f428bf67b9dc182a578ab6705d92cc80fbd24456d456292066ba5520445fd952c79a7b87d297d5b531ec2f1f38b9d2effcfdffe5a2fddfd3799762cdacc82298c9ab13773fb803ee1237b6eb92f36a307caa6eb5c78e16ea9f7dfa966f628cb1d90e46faa8cb5148df25a7a916e22e4c9eb9e49115512da9c40d2e024563b090cd6edec618424b7e8c6ccea7d930c80fc6c04057c9a492dd00676108c4bf9f774080673cdb35ae96134e71518e7103431127be6c15a4b41d09b2091d821390b53458ff24662d5cd3d483be3759cd569ef6ec0435cbe87addd33418f0efe2dd705f72bc96391ed8ee248f81f175eca338224fb4e084823f2458ab87eeaf5cdafd03c163977b453eb6558c4483afbe60088555f51651e23851d0ba31fee3458c918a03e15639d268686dc14618a26ec4280152db72408b33f31208c5d21a0c974291c268f026dd66ab1cd28d3da9e453ea14ad02b3883029c90ce80a271c212b78c8ea01eda046ddc6bd1541c2e767e6109b674bd8ee1de32c79bed4f5292f587dbfadb3c88b8bf25d45ecb1ced6413143b79e1b2d915855b4e992b4126238302edef5596fd5a945c6fefac0b65452bb03168867977c15b6bb825c81f33d0dbbccec8a861d0537aaa022b33d2d502c4eca91e771291cf17aaae6fa8771a1db2f7b25564afca3a63f085e4baa2c73e290b7901008d240b4b75b63a425c10089bb4b63882d07b057a9bc7faca4189af34bd0e0fa84279ce8fb44c813d6403c39bcee460842d292febd4a9a50042f14f89b885642260e41a741ee84adf1f683fac05474829999d7097cca2b65a8c7d53039bef1e8c0feaadb426b238258c32902764713d414bb90a15a8053c35968bae8a2264b0c40d544c967448112358622c0b9adaa16ee1d6fc3d31418a9dd0caefb1e557abe9256c66b5e6cf4a7ba5d97f8d9fbeeca155be6954667ec9f7d4605cd68add94dab20fdec93e443f8912f18e10395125c820f63cd5d95e1290698d56b5a5985d01c9c6f32e06ead51b6829100bc1c3970ae896c676f0716b4a160a26aebf63c66ad13a03683406fbf546feb135ad137f84ce307ee4acba9d5f6b33203cccc7321f543ac6474b26f89c9262b2ba87f28df1fea54f9bcd0c7874b2f0e93d8b3da4a3e0eba0ddc907fb241f312f269fbfb12d9602d1a95667e059f67e22632e2a329621e1c162ed576b2545823b02e3d80557f3b43e99198f768050882890afb9d08ea669ec9f22b3b84c13cad477a2c2a2c637aa8ad32d505c72bd8f4e6e8ba0085892fa8a3b6e61ddd7bf719463eaf18e2afb9332c167b3e82e56342eae3eea9f17e9e8b0f5e534ff6c7996831453097da3b4b67dab351fa85bb7896fff19efc5d35702d47fad654b51e2fc82ee81a063898a7276190255b5e208cc3c34373ba559d3fe2c11c5899cbc70499d398c9eb95d583bce6fc823b2f76a8c1a71771599f90c9f8beaacc272bc833c1edcfb857f93ffa7b56059765acb619537af5396799093bdccea3a3cb4ef8ec0a3d0efe092547e1b4fa163adc2adeb5d6a2a9fa0b03e51914e575f90aa4c79ff09e71956bd1301275c5d2ad811acbef4b6e800e38047c1c243f2d5aabcea941413f775104dfda7d655b148c7c3fb4d53548cfd06f503ba421e99cb683f6beaed2b43b5d3d9a1f6038256ee24cc6a5512852042f98d9e05a9475983afd97460e66b932f6c2beac0e3fe590b216a85e81820b58913cd8af7f15cf1e3564300bde394fad9bb5eb7ba534015c127f31c2cd2ae68462d9998e5e1286cd85cd15bcb7859cbe323ed0b084d4282808f81711ccd10180711797b6d36f50cb407acc5f8f89c43c29cddcaff39756548bf62dc49e9e1c4755887395ae2d5bc5b2e81c2e47190f962fa9162375a34bd6ba586daf9b56f5334a64b739e817383a85fa3099cac83074e1f257e6ed085fb01fce0058f9a3bc6ae5b660") 08:57:56 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x0, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x257) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:56 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x84100, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000040)=0x77, 0x4) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_\nxtra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x2000000000000000, 0x0) 08:57:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x3f00000000000000, 0x0) 08:57:57 executing program 1: open(&(0x7f0000000080)='.\x00', 0x8000, 0x800020) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_%xtra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x8bffffff00000000, 0x0) [ 1228.617804] EXT4-fs: 7 callbacks suppressed [ 1228.617815] EXT4-fs (sda1): Unrecognized mount option "debug_want_%xtra_isize=0x0000000000000000" or missing value 08:57:57 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x0, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) [ 1228.734395] EXT4-fs (sda1): Unrecognized mount option "debug_want_%xtra_isize=0x0000000000000000" or missing value 08:57:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x257) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x8cffffff00000000, 0x0) 08:57:57 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0xffffffffffffffff) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000000)=0x15, 0x4) 08:57:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_\x85xtra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xe0ffffffffffffff, 0x0) 08:57:57 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f0000000000)={0x0, "77febfb17afd1731184c53e21dae22a1c5c53645f68e7a633987034ddc3b912c", 0x7, 0x200, 0x7fffffff, 0x81, 0x1d, 0x3, 0x200, 0x1f}) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) [ 1229.132819] EXT4-fs (sda1): Unrecognized mount option "debug_want_…xtra_isize=0x0000000000000000" or missing value [ 1229.266222] EXT4-fs (sda1): Unrecognized mount option "debug_want_…xtra_isize=0x0000000000000000" or missing value 08:57:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xe4ffffff00000000, 0x0) 08:57:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:58 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f0000000080)={0x8}) stat(&(0x7f0000000000)='./bus\x00', &(0x7f0000000540)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x20000012}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000180)={0x14}) 08:57:58 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x0, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:57:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf830ba9b9448aebba376c0a75dff27315e9ab8d25f92e6990056e0207fe4d451b62624a1be93d6951b9c42d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7bea3ae603def7f99defee0f55dd287483e308bfa8d9f93b69b2f3b7e0916d4adb266df3240872fc4c9f5e8d86a95ad9a6373915cfbd6f1cc80ce2dd29dda28a539929a9"], 0x257) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:57:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xf6ffffff00000000, 0x0) 08:57:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_e\ntra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:58 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) socket$nl_crypto(0x10, 0x3, 0x15) 08:57:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:58 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xfeffffff00000000, 0x0) [ 1230.084362] EXT4-fs (sda1): Unrecognized mount option "debug_want_e [ 1230.084362] tra_isize=0x0000000000000000" or missing value 08:57:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:59 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x3, 0x2) connect$unix(r0, &(0x7f0000000140)=@file={0x0, './bus\x00'}, 0x6e) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, r0, 0x0, 0xf, &(0x7f0000000200)='vboxnet1cgroup\x00'}, 0x30) getpgrp(r2) ioctl$sock_x25_SIOCADDRT(r1, 0x890b, &(0x7f0000000000)={@null=' \x00', 0x9, 'batadv0\x00'}) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) write$P9_RLERRORu(r1, &(0x7f0000000280)={0x15, 0x7, 0x2, {{0x8, 'batadv0\x00'}, 0x20}}, 0x15) 08:57:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_e\x85tra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:59 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x0, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) [ 1230.440596] EXT4-fs (sda1): Unrecognized mount option "debug_want_e…tra_isize=0x0000000000000000" or missing value [ 1230.561165] EXT4-fs (sda1): Unrecognized mount option "debug_want_e…tra_isize=0x0000000000000000" or missing value 08:57:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xff01000000000000, 0x0) 08:57:59 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x12000, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x2}) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000000)='./bus\x00', &(0x7f0000000540)) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f00000000c0)=0x3f) gettid() getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) 08:57:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_ex\nra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:57:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x25c) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 1230.885323] EXT4-fs (sda1): Unrecognized mount option "debug_want_ex [ 1230.885323] ra_isize=0x0000000000000000" or missing value 08:57:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:59 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r0 = getpid() move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffb000/0x2000)=nil], 0x0, &(0x7f0000000040)=[0x0], 0x2) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:57:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xff0f000000000000, 0x0) [ 1231.055034] EXT4-fs (sda1): Unrecognized mount option "debug_want_ex [ 1231.055034] ra_isize=0x0000000000000000" or missing value 08:57:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:57:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xffffff7f00000000, 0x0) 08:57:59 executing program 1: open(&(0x7f0000000040)='./file0\x00', 0x200c0, 0x1) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) open$dir(&(0x7f0000000000)='./bus\x00', 0x800, 0x4) 08:58:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_ex%ra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xffffffff00000000, 0x0) 08:58:00 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) 08:58:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:00 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) [ 1231.464652] EXT4-fs (sda1): Unrecognized mount option "debug_want_ex%ra_isize=0x0000000000000000" or missing value 08:58:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xffffffffffffffe0, 0x0) 08:58:00 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000540)) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000040)={r0, 0x81, 0x90004, r0}) 08:58:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_exXra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:00 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x25c) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:58:00 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:58:00 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x2) 08:58:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x4) 08:58:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_ex\x85ra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:00 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)) futimesat(r0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)={{}, {0x0, 0x7530}}) 08:58:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x6) 08:58:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xc) 08:58:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:01 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf830ba9b9448aebba376c0a75dff27315e9ab8d25f92e6990056e0207fe4d451b62624a1be93d6951b9c42d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7bea3ae603def7f99defee0f55dd287483e308bfa8d9f93b69b2f3b7e0916d4adb266df3240872fc4c9f5e8d86a95ad9a6373915cfbd6f1cc80ce2dd29dda28a539929a959fe736c0c"], 0x25c) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:58:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:01 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000400)={&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/216, 0xd8}, {&(0x7f0000000200)=""/10, 0xa}, {&(0x7f0000000240)=""/87, 0x57}, {&(0x7f00000002c0)=""/155, 0x9b}], 0x4, &(0x7f00000003c0)=""/41, 0x29}, 0x10000) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:58:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xd) 08:58:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_ext\na_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:01 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x12) 08:58:01 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) socket$inet_tcp(0x2, 0x1, 0x0) 08:58:01 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000040)='./bus\x00', &(0x7f0000000540)) 08:58:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0xf, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_ext%a_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:02 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141045, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) 08:58:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xe0) 08:58:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_ext\x85a_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:02 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:02 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x25e) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:58:02 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000000)='./bus\x00', &(0x7f0000000540)) 08:58:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0xc0, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1233.888903] EXT4-fs: 9 callbacks suppressed [ 1233.888915] EXT4-fs (sda1): Unrecognized mount option "debug_want_ext…a_isize=0x0000000000000000" or missing value 08:58:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x600) 08:58:02 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) [ 1234.056579] EXT4-fs (sda1): Unrecognized mount option "debug_want_ext…a_isize=0x0000000000000000" or missing value 08:58:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0xec0, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xc00) 08:58:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extr\n_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0xf00000000000000, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x4, 0x0, r1, 0x0, [0x305f, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000]}, 0x2c) 08:58:03 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x33fe0, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xd00) [ 1234.428820] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr [ 1234.428820] _isize=0x0000000000000000" or missing value [ 1234.577757] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr [ 1234.577757] _isize=0x0000000000000000" or missing value 08:58:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x200002a4, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:03 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="9d17992d5445056147c88c818dd82d2dcd", @ANYRESDEC], 0x2, 0x0, 0x0) 08:58:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x1200) 08:58:03 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x25e) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:58:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extr%_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:03 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x7ffff000, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x2000) 08:58:03 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x2e4, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) pread64(r1, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) [ 1234.914106] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr%_isize=0x0000000000000000" or missing value 08:58:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0xfffffdef, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1235.095301] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr%_isize=0x0000000000000000" or missing value 08:58:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x3f00) [ 1235.174902] protocol 88fb is buggy, dev hsr_slave_0 [ 1235.180116] protocol 88fb is buggy, dev hsr_slave_1 [ 1235.185311] protocol 88fb is buggy, dev hsr_slave_0 [ 1235.190388] protocol 88fb is buggy, dev hsr_slave_1 08:58:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extr\x85_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 1235.272867] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1235.366796] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 08:58:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x2, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:04 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xe0ff) [ 1235.528943] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr…_isize=0x0000000000000000" or missing value 08:58:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x8, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:04 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x25e) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:58:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xff01) [ 1235.646158] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr…_isize=0x0000000000000000" or missing value 08:58:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra\nisize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x300, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1235.856494] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1235.925665] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1235.974905] protocol 88fb is buggy, dev hsr_slave_0 [ 1235.974940] protocol 88fb is buggy, dev hsr_slave_0 [ 1235.980032] protocol 88fb is buggy, dev hsr_slave_1 [ 1235.985098] protocol 88fb is buggy, dev hsr_slave_1 [ 1236.094111] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra [ 1236.094111] isize=0x0000000000000000" or missing value 08:58:05 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fallocate(r1, 0x40, 0x0, 0x1000f4) 08:58:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0xffffff1f, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xff0f) 08:58:05 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) [ 1236.271984] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra [ 1236.271984] isize=0x0000000000000000" or missing value 08:58:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra\x85isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x2, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xffe0) [ 1236.581932] overlayfs: failed to resolve './file1': -2 08:58:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x3, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:05 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x25f) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:58:05 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r1, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000004}) flock(r1, 0x2) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r2, 0x0) flock(r1, 0x2) flock(r1, 0x2) msgrcv(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000080905c373400000000000000000000005b90bd7b72e9738e0497bc5fd2e3de754d56a5cf6a1fa197a15caa5ad6000000cb8e5ff2a8f8b3501c8c914b1b38d170e0db20c4ee05b4ee83608107be35606ef511019f5a9052"], 0x1, 0x0, 0x0) 08:58:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x4, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x23c01) 08:58:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_\nsize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:05 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x8, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x1000000) 08:58:05 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x101000002}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000000000002, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="64869c37be72e4fddd7e0ae16087dcf944584574f9f041d50a1a41026809133995c730dfd413d0e461033cdea4bc7408773975ab8bc5dd25a0b03b12e3db19cbc725c3efb4ab02656013b752fc94ade664486e82"], 0x1, 0x0, 0x0) 08:58:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x13c0200) 08:58:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0xa, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x3, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:06 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x25f) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:58:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x2000000) 08:58:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_\x85size'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:06 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0xe, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:06 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x4000000) 08:58:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0xf, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x6000000) 08:58:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_i\nize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x10, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xc000000) 08:58:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x60, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:07 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xd000000) 08:58:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_i#ize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:07 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x25f) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:58:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x12000000) 08:58:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0xf0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:07 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0xa}}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r3 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r3, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x300, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_i%ize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x20000000) 08:58:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0xa00, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1239.129037] EXT4-fs: 10 callbacks suppressed [ 1239.129048] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i%ize=0x0000000000000000" or missing value [ 1239.380379] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i%ize=0x0000000000000000" or missing value 08:58:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0xe00, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x3f000000) 08:58:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_i#ize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:08 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440), 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_i*ize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:08 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf830ba9b9448aebba376c0a75dff27315e9ab8d25f92e6990056e0207fe4d451b62624a1be93d6951b9c42d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7bea3ae603def7f99defee0f55dd287483e308bfa8d9f93b69b2f3b7e0916d4adb266df3240872fc4c9f5e8d86a95ad9a6373915cfbd6f1cc80ce2dd29dda28a539929a959fe736c0c41515562"], 0x260) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 1239.565371] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i#ize=0x0000000000000000" or missing value 08:58:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x8bffffff) 08:58:08 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0xebc, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1239.682727] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i*ize=0x0000000000000000" or missing value 08:58:08 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf830ba9b9448aebba376c0a75dff27315e9ab8d25f92e6990056e0207fe4d451b62624a1be93d6951b9c42d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7bea3ae603def7f99defee0f55dd287483e308bfa8d9f93b69b2f3b7e0916d4adb266df3240872fc4c9f5e8d86a95ad9a6373915cfbd6f1cc80ce2dd29dda28a539929a959fe736c0c41515562"], 0x260) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:58:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_i+ize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x8cffffff) 08:58:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xe0ffffff) 08:58:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0xf00, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:08 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 1240.098309] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i+ize=0x0000000000000000" or missing value 08:58:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x6000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xe4ffffff) 08:58:09 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_elf64(r0, 0x0, 0x0) 08:58:09 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440), 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:09 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_i-ize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0xbc0e, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xf6ffffff) 08:58:09 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_elf64(r0, 0x0, 0x0) [ 1240.834407] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i-ize=0x0000000000000000" or missing value 08:58:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0xf000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xfeffffff) 08:58:09 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_elf64(r0, 0x0, 0x0) 08:58:09 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440), 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) [ 1241.013188] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i-ize=0x0000000000000000" or missing value 08:58:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xff010000) 08:58:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x30000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:09 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x4) 08:58:10 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_i.ize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xff0f0000) 08:58:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x34000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:10 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x4) 08:58:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x400300, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1241.747460] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i.ize=0x0000000000000000" or missing value 08:58:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xffffff7f) 08:58:10 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x4) [ 1241.838414] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i.ize=0x0000000000000000" or missing value 08:58:10 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_i0ize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0xf0ffff, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:10 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf830ba9b9448aebba376c0a75dff27315e9ab8d25f92e6990056e0207fe4d451b62624a1be93d6951b9c42d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7bea3ae603def7f99defee0f55dd287483e308bfa8d9f93b69b2f3b7e0916d4adb266df3240872fc4c9f5e8d86a95ad9a6373915cfbd6f1cc80ce2dd29dda28a539929a959fe736c0c41515562"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES16=0x0], 0x2) [ 1242.196566] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i0ize=0x0000000000000000" or missing value 08:58:11 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, 0x0, 0x0) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_iXize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x1000000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:11 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf830ba9b9448aebba376c0a75dff27315e9ab8d25f92e6990056e0207fe4d451b62624a1be93d6951b9c42d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7bea3ae603def7f99defee0f55dd287483e308bfa8d9f93b69b2f3b7e0916d4adb266df3240872fc4c9f5e8d86a95ad9a6373915cfbd6f1cc80ce2dd29dda28a539929a959fe736c0c41515562"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES16=0x0], 0x2) 08:58:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xffffff8b) 08:58:11 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x80) 08:58:11 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf830ba9b9448aebba376c0a75dff27315e9ab8d25f92e6990056e0207fe4d451b62624a1be93d6951b9c42d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7bea3ae603def7f99defee0f55dd287483e308bfa8d9f93b69b2f3b7e0916d4adb266df3240872fc4c9f5e8d86a95ad9a6373915cfbd6f1cc80ce2dd29dda28a539929a959fe736c0c41515562"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES16=0x0], 0x2) 08:58:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xffffff8c) 08:58:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x2000000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:11 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, 0x0, 0x0) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) [ 1242.858752] audit: type=1804 audit(1546592291.609:78): pid=10648 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir412989208/syzkaller.Q5or3D/1690/bus" dev="sda1" ino=16769 res=1 08:58:11 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x80) 08:58:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_icize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xffffffe0) 08:58:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x3000000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1243.057191] audit: type=1804 audit(1546592291.809:79): pid=10668 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir412989208/syzkaller.Q5or3D/1691/bus" dev="sda1" ino=17217 res=1 08:58:11 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f0000000500)='./bus\x00', &(0x7f0000000540)) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x80) 08:58:11 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) stat(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000540)) 08:58:11 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, 0x0, 0x0) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xffffffe4) 08:58:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x4000000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:12 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(0x0, 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf6a0ba9b9448aebba376c0a75df6ce2aee3f27315d2ab8d25f92e6990056e0207fe4d451b62624a1be93d69512dff2d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7bea3ae603def7f99defee0f55dd287483e308bfa8d9f93b69b2f3b7e0916d4adb266df3240872fc4c9f5e8d86a973d9a63739156f1cc80ce2dd29dda28a539929a959fe736c0c41515562f7c7d97db6fa2fd8707d74be4c049e0acc305aa95eeae1cef4a1a68b6deb1b9b"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:12 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x80) 08:58:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xfffffff6) 08:58:12 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x4) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) [ 1243.481619] audit: type=1804 audit(1546592292.229:80): pid=10706 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir412989208/syzkaller.Q5or3D/1693/bus" dev="sda1" ino=17361 res=1 08:58:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_idize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:12 executing program 1: open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x80) 08:58:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x8000000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:12 executing program 1: open(0x0, 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x80) 08:58:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xfffffffe) 08:58:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0xa000000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:12 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x80) 08:58:12 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x4) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:13 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300), 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_iiize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x10000000000) 08:58:13 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(0x0, 0x200, 0x80) 08:58:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0xe000000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:13 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x4) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0xf000000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1244.340663] EXT4-fs: 7 callbacks suppressed [ 1244.340674] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iiize=0x0000000000000000" or missing value 08:58:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x100000000000000) 08:58:13 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x0, 0x80) 08:58:13 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES16=0x0], 0x2) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x10000000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1244.513201] audit: type=1804 audit(1546592293.259:81): pid=10777 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir412989208/syzkaller.Q5or3D/1698/bus" dev="sda1" ino=17505 res=1 08:58:13 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x0, 0x80) [ 1244.588189] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iiize=0x0000000000000000" or missing value [ 1244.723559] audit: type=1804 audit(1546592293.469:82): pid=10794 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir412989208/syzkaller.Q5or3D/1699/bus" dev="sda1" ino=17553 res=1 08:58:13 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300), 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x13c020000000000) 08:58:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_ilize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x60000000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:13 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x0, 0x80) 08:58:13 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES16=0x0], 0x2) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) [ 1245.043991] audit: type=1804 audit(1546592293.789:83): pid=10805 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir412989208/syzkaller.Q5or3D/1700/bus" dev="sda1" ino=17457 res=1 08:58:13 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x0) 08:58:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x200000000000000) [ 1245.093377] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ilize=0x0000000000000000" or missing value 08:58:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x9effffff, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1245.237925] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ilize=0x0000000000000000" or missing value 08:58:14 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:14 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES16=0x0], 0x2) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) [ 1245.286259] audit: type=1804 audit(1546592294.039:84): pid=10824 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir412989208/syzkaller.Q5or3D/1701/bus" dev="sda1" ino=17681 res=1 08:58:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x400000000000000) 08:58:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0xbc0e0000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_ioize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x600000000000000) 08:58:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0xf8f73f0000000000, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:14 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:14 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r3 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r3, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf6a0ba9b9448aebba376c0a75df6ce2aee3f27315d2ab8d25f92e6990056e0207fe4d451b62624a1be93d69512dff2d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7bea3ae603def7f99defee0f55dd287483e308bfa8d9f93b69b2f3b7e0916d4adb266df3240872fc4c9f5e8d86a973d9a63739156f1cc80ce2dd29dda28a539929a959fe736c0c41515562f7c7d97db6fa2fd8707d74be4c049e0acc305aa95eeae1cef4a1a68b6deb1b9b"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0xf0ffffff, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1245.889118] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ioize=0x0000000000000000" or missing value 08:58:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xc00000000000000) 08:58:14 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) [ 1246.066787] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ioize=0x0000000000000000" or missing value 08:58:14 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r3 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r3, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0xfffff000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xd00000000000000) 08:58:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_ipize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0xffffff7f, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x1200000000000000) [ 1246.543892] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ipize=0x0000000000000000" or missing value 08:58:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0xffffff9e, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1246.723404] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ipize=0x0000000000000000" or missing value 08:58:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x2000000000000000) 08:58:15 executing program 3 (fault-call:1 fault-nth:0): open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x0) 08:58:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_iuize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0xfffffff0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:15 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) [ 1247.107955] FAULT_INJECTION: forcing a failure. [ 1247.107955] name failslab, interval 1, probability 0, space 0, times 0 [ 1247.151017] CPU: 1 PID: 10922 Comm: syz-executor3 Not tainted 4.20.0+ #8 [ 1247.157899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1247.157906] Call Trace: [ 1247.157928] dump_stack+0x1db/0x2d0 [ 1247.157951] ? dump_stack_print_info.cold+0x20/0x20 [ 1247.178500] ? __f_unlock_pos+0x19/0x20 [ 1247.178524] should_fail.cold+0xa/0x15 [ 1247.178544] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1247.178567] ? ___might_sleep+0x1e7/0x310 [ 1247.195642] ? arch_local_save_flags+0x50/0x50 [ 1247.200245] __should_failslab+0x121/0x190 [ 1247.204488] should_failslab+0x9/0x14 [ 1247.208285] kmem_cache_alloc+0x2be/0x710 [ 1247.208306] ? check_preemption_disabled+0x48/0x290 [ 1247.208324] getname_flags+0xd6/0x5b0 [ 1247.208341] getname+0x1a/0x20 [ 1247.217376] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iuize=0x0000000000000000" or missing value [ 1247.217508] do_sys_open+0x3a5/0x7c0 [ 1247.238674] ? filp_open+0x80/0x80 [ 1247.242228] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1247.247605] ? trace_hardirqs_off_caller+0x300/0x300 [ 1247.252718] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1247.257483] __x64_sys_open+0x7e/0xc0 [ 1247.261343] do_syscall_64+0x1a3/0x800 [ 1247.265241] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1247.270176] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1247.275197] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1247.280063] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1247.285259] RIP: 0033:0x457ec9 08:58:16 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r3 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r3, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xd9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:16 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x3f00000000000000) 08:58:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x3000000000000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1247.288450] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1247.307349] RSP: 002b:00007f782df97c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1247.315091] RAX: ffffffffffffffda RBX: 00007f782df97c90 RCX: 0000000000457ec9 [ 1247.322387] RDX: 0000000000000000 RSI: 0000000000000200 RDI: 0000000020000000 [ 1247.329645] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1247.336904] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f782df986d4 [ 1247.344163] R13: 00000000004c3beb R14: 00000000004d6a00 R15: 0000000000000004 08:58:16 executing program 3 (fault-call:1 fault-nth:1): open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x0) 08:58:16 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x8bffffff00000000) 08:58:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x40030000000000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_ixize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 1247.700874] FAULT_INJECTION: forcing a failure. [ 1247.700874] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1247.712739] CPU: 0 PID: 10953 Comm: syz-executor3 Not tainted 4.20.0+ #8 [ 1247.719592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1247.728965] Call Trace: [ 1247.731562] dump_stack+0x1db/0x2d0 [ 1247.735208] ? dump_stack_print_info.cold+0x20/0x20 [ 1247.740235] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1247.745778] ? _kstrtoull+0x17d/0x250 [ 1247.749610] should_fail.cold+0xa/0x15 [ 1247.753509] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1247.758626] ? get_pid_task+0xd4/0x190 [ 1247.762534] ? find_held_lock+0x35/0x120 [ 1247.766620] ? get_pid_task+0xd4/0x190 [ 1247.770533] should_fail_alloc_page+0x50/0x60 [ 1247.775038] __alloc_pages_nodemask+0x323/0xdc0 [ 1247.779737] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1247.784757] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1247.790315] ? ___might_sleep+0x1e7/0x310 [ 1247.794483] ? trace_hardirqs_off+0xb8/0x310 [ 1247.798935] cache_grow_begin+0x9c/0x8c0 [ 1247.803002] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1247.808554] kmem_cache_alloc+0x645/0x710 [ 1247.812735] getname_flags+0xd6/0x5b0 [ 1247.816560] getname+0x1a/0x20 [ 1247.819764] do_sys_open+0x3a5/0x7c0 [ 1247.823487] ? filp_open+0x80/0x80 [ 1247.827043] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1247.832420] ? trace_hardirqs_off_caller+0x300/0x300 [ 1247.837542] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1247.842302] __x64_sys_open+0x7e/0xc0 [ 1247.846165] do_syscall_64+0x1a3/0x800 [ 1247.850059] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1247.855014] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1247.860052] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1247.864908] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1247.870114] RIP: 0033:0x457ec9 [ 1247.873312] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1247.892221] RSP: 002b:00007f782df97c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 08:58:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0xf0ffffffffffff, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:16 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x8cffffff00000000) [ 1247.899930] RAX: ffffffffffffffda RBX: 00007f782df97c90 RCX: 0000000000457ec9 [ 1247.907214] RDX: 0000000000000000 RSI: 0000000000000200 RDI: 0000000020000000 [ 1247.914484] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1247.921771] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f782df986d4 [ 1247.929045] R13: 00000000004c3beb R14: 00000000004d6a00 R15: 0000000000000004 08:58:16 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, 0x0, 0x0) [ 1248.023757] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ixize=0x0000000000000000" or missing value 08:58:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x100000000000000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:16 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xe0ffffffffffffff) 08:58:16 executing program 1 (fault-call:8 fault-nth:0): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf830ba9b9448aebba376c0a75dff27315e9ab8d25f92e6990056e0207fe4d451b62624a1be93d6951b9c42d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7bea3ae603def7f99defee0f55dd287483e308bfa8d9f93b69b2f3b7e0916d4adb266df3240872fc4c9f5e8d86a95ad9a6373915cfbd6f1cc80ce2dd29dda28a539929a959fe736c0c41515562"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 1248.151962] audit: type=1804 audit(1546592296.899:85): pid=10953 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1518/bus" dev="sda1" ino=17617 res=1 08:58:17 executing program 3 (fault-call:1 fault-nth:2): open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x0) 08:58:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x200000000000000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_i\x85ize'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xe4ffffff00000000) [ 1248.368899] FAULT_INJECTION: forcing a failure. [ 1248.368899] name failslab, interval 1, probability 0, space 0, times 0 [ 1248.414136] CPU: 0 PID: 10984 Comm: syz-executor1 Not tainted 4.20.0+ #8 [ 1248.421018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1248.430374] Call Trace: [ 1248.432982] dump_stack+0x1db/0x2d0 [ 1248.436624] ? dump_stack_print_info.cold+0x20/0x20 [ 1248.441660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1248.447387] should_fail.cold+0xa/0x15 [ 1248.451287] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1248.456420] ? ___might_sleep+0x1e7/0x310 [ 1248.460574] ? arch_local_save_flags+0x50/0x50 [ 1248.465169] __should_failslab+0x121/0x190 [ 1248.469409] should_failslab+0x9/0x14 [ 1248.473233] kmem_cache_alloc_node+0x265/0x710 [ 1248.477817] ? check_noncircular+0x20/0x20 [ 1248.482070] ? print_usage_bug+0xd0/0xd0 [ 1248.486143] __alloc_skb+0xf4/0x730 [ 1248.489803] ? skb_scrub_packet+0x440/0x440 [ 1248.494153] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1248.499165] ? tcp_current_mss+0x29d/0x410 [ 1248.503404] ? tcp_mtu_to_mss+0x4e0/0x4e0 [ 1248.507551] sk_stream_alloc_skb+0x147/0x9b0 [ 1248.511975] ? tcp_init_transfer+0x480/0x480 [ 1248.516389] ? tcp_fastopen_reset_cipher.cold+0x46/0x46 [ 1248.521767] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1248.526793] ? tcp_send_mss+0x173/0x2c0 [ 1248.530836] tcp_sendmsg_locked+0xe6e/0x3e80 [ 1248.535265] ? add_lock_to_list.isra.0+0x450/0x450 [ 1248.540214] ? print_usage_bug+0xd0/0xd0 [ 1248.544289] ? lock_sock_nested+0xac/0x120 [ 1248.548596] ? tcp_sendpage+0x60/0x60 [ 1248.552419] ? trace_hardirqs_on+0xbd/0x310 [ 1248.556757] ? lock_sock_nested+0xe2/0x120 [ 1248.560993] ? trace_hardirqs_off_caller+0x300/0x300 [ 1248.566124] ? check_preemption_disabled+0x48/0x290 [ 1248.571149] ? lock_sock_nested+0x9a/0x120 [ 1248.571419] FAULT_INJECTION: forcing a failure. [ 1248.571419] name failslab, interval 1, probability 0, space 0, times 0 [ 1248.575395] ? __local_bh_enable_ip+0x15a/0x270 [ 1248.575417] tcp_sendmsg+0x30/0x50 [ 1248.575435] inet_sendmsg+0x1af/0x740 [ 1248.575453] ? ipip_gro_receive+0x100/0x100 [ 1248.575468] ? smack_socket_sendmsg+0xb1/0x1a0 [ 1248.575483] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1248.575499] ? security_socket_sendmsg+0x93/0xc0 [ 1248.575530] ? ipip_gro_receive+0x100/0x100 [ 1248.575547] sock_sendmsg+0xdd/0x130 [ 1248.575566] sock_write_iter+0x379/0x5e0 [ 1248.575585] ? sock_sendmsg+0x130/0x130 [ 1248.575611] ? lock_downgrade+0x910/0x910 [ 1248.575625] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1248.575641] ? iov_iter_init+0xea/0x220 [ 1248.575661] __vfs_write+0x764/0xb40 [ 1248.575680] ? kernel_read+0x120/0x120 [ 1248.575713] ? __mutex_unlock_slowpath+0x195/0x870 [ 1248.660220] ? wait_for_completion+0x810/0x810 [ 1248.664813] ? rw_verify_area+0x118/0x360 [ 1248.668986] vfs_write+0x20c/0x580 [ 1248.672537] ksys_write+0x105/0x260 [ 1248.676183] ? __ia32_sys_read+0xb0/0xb0 [ 1248.680259] ? trace_hardirqs_off_caller+0x300/0x300 [ 1248.685375] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1248.690144] __x64_sys_write+0x73/0xb0 [ 1248.694045] do_syscall_64+0x1a3/0x800 [ 1248.697957] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1248.702897] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1248.707926] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1248.712821] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1248.718019] RIP: 0033:0x457ec9 [ 1248.721216] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1248.740121] RSP: 002b:00007f200dd47c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1248.747874] RAX: ffffffffffffffda RBX: 00007f200dd47c90 RCX: 0000000000457ec9 [ 1248.755145] RDX: 000000000000ff5a RSI: 0000000020000100 RDI: 0000000000000003 [ 1248.762418] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1248.769690] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f200dd486d4 [ 1248.776962] R13: 00000000004c6f6a R14: 00000000004dc4a8 R15: 0000000000000006 [ 1248.784290] CPU: 1 PID: 10992 Comm: syz-executor3 Not tainted 4.20.0+ #8 [ 1248.791143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1248.800494] Call Trace: [ 1248.803090] dump_stack+0x1db/0x2d0 [ 1248.806731] ? dump_stack_print_info.cold+0x20/0x20 [ 1248.811780] should_fail.cold+0xa/0x15 08:58:17 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, 0x0, 0x0) [ 1248.815694] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1248.820831] ? ___might_sleep+0x1e7/0x310 [ 1248.825002] ? arch_local_save_flags+0x50/0x50 [ 1248.829593] ? print_usage_bug+0xd0/0xd0 [ 1248.833668] __should_failslab+0x121/0x190 [ 1248.837916] should_failslab+0x9/0x14 [ 1248.841729] kmem_cache_alloc+0x2be/0x710 [ 1248.845903] ? __lock_acquire+0x572/0x4a30 [ 1248.850144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1248.855682] __alloc_file+0x93/0x480 [ 1248.859390] ? file_free_rcu+0xe0/0xe0 [ 1248.863277] ? mark_held_locks+0x100/0x100 [ 1248.867517] alloc_empty_file+0x72/0x170 [ 1248.871571] path_openat+0x112/0x5650 [ 1248.875385] ? add_lock_to_list.isra.0+0x450/0x450 [ 1248.880318] ? __alloc_fd+0x549/0x700 [ 1248.884108] ? find_held_lock+0x35/0x120 [ 1248.888153] ? path_lookupat.isra.0+0xba0/0xba0 [ 1248.892835] ? do_dup2+0x580/0x580 [ 1248.896383] ? kasan_check_read+0x11/0x20 [ 1248.900515] ? do_raw_spin_unlock+0xa0/0x330 [ 1248.904907] ? do_raw_spin_trylock+0x270/0x270 [ 1248.909477] do_filp_open+0x26f/0x370 [ 1248.913268] ? may_open_dev+0x100/0x100 [ 1248.917236] ? exit_files+0xb0/0xb0 [ 1248.920857] ? strncpy_from_user+0x317/0x440 [ 1248.925264] ? digsig_verify.cold+0x32/0x32 [ 1248.929590] ? get_unused_fd_flags+0x122/0x1a0 [ 1248.934154] ? __alloc_fd+0x700/0x700 [ 1248.937939] ? getname_flags+0x277/0x5b0 [ 1248.941989] do_sys_open+0x59a/0x7c0 [ 1248.945683] ? filp_open+0x80/0x80 [ 1248.949205] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1248.954551] ? trace_hardirqs_off_caller+0x300/0x300 [ 1248.959639] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1248.964381] __x64_sys_open+0x7e/0xc0 [ 1248.968168] do_syscall_64+0x1a3/0x800 [ 1248.972053] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1248.976976] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1248.981988] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1248.986832] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1248.992022] RIP: 0033:0x457ec9 [ 1248.995215] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:58:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x300000000000000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1249.014102] RSP: 002b:00007f782df97c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1249.021820] RAX: ffffffffffffffda RBX: 00007f782df97c90 RCX: 0000000000457ec9 [ 1249.029080] RDX: 0000000000000000 RSI: 0000000000000200 RDI: 0000000020000000 [ 1249.036335] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1249.043617] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f782df986d4 [ 1249.050863] R13: 00000000004c3beb R14: 00000000004d6a00 R15: 0000000000000004 08:58:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xf6ffffff00000000) 08:58:17 executing program 3 (fault-call:1 fault-nth:3): open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x0) 08:58:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x400000000000000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 1249.284633] FAULT_INJECTION: forcing a failure. [ 1249.284633] name failslab, interval 1, probability 0, space 0, times 0 [ 1249.321230] CPU: 1 PID: 11014 Comm: syz-executor3 Not tainted 4.20.0+ #8 [ 1249.328090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1249.337445] Call Trace: [ 1249.340035] dump_stack+0x1db/0x2d0 [ 1249.343684] ? dump_stack_print_info.cold+0x20/0x20 [ 1249.348728] ? add_lock_to_list.isra.0+0x450/0x450 [ 1249.353665] should_fail.cold+0xa/0x15 [ 1249.357557] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1249.362679] ? ___might_sleep+0x1e7/0x310 [ 1249.366836] ? arch_local_save_flags+0x50/0x50 [ 1249.371432] ? lock_downgrade+0x910/0x910 [ 1249.375589] __should_failslab+0x121/0x190 [ 1249.379849] should_failslab+0x9/0x14 [ 1249.383653] kmem_cache_alloc+0x2be/0x710 [ 1249.387803] ? kasan_check_write+0x14/0x20 [ 1249.392041] ? do_raw_read_unlock+0x3f/0x70 [ 1249.396365] ? _raw_read_unlock+0x2d/0x50 [ 1249.400538] ima_d_path+0x52/0x1ee [ 1249.404090] ? integrity_inode_get+0x2a/0x260 [ 1249.408596] process_measurement+0xdb3/0x1be0 [ 1249.413115] ? ima_add_template_entry.cold+0x48/0x48 [ 1249.418237] ? smack_task_getsecid+0x1ec/0x3d0 [ 1249.422820] ? find_held_lock+0x35/0x120 [ 1249.426883] ? smack_task_getsecid+0x1ec/0x3d0 [ 1249.431475] ? lock_downgrade+0x910/0x910 [ 1249.435637] ? kasan_check_read+0x11/0x20 [ 1249.439802] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1249.445093] ? rcu_read_unlock_special+0x380/0x380 [ 1249.450048] ? smack_task_getsecid+0x213/0x3d0 [ 1249.454819] ? smack_cred_getsecid+0x230/0x230 [ 1249.459406] ? do_dentry_open+0x932/0x1210 [ 1249.463640] ? privileged_wrt_inode_uidgid+0x68/0xd0 [ 1249.468750] ima_file_check+0xe3/0x130 [ 1249.472637] ? process_measurement+0x1be0/0x1be0 [ 1249.477386] ? inode_permission+0xb4/0x570 [ 1249.481623] path_openat+0x14d7/0x5650 [ 1249.485516] ? add_lock_to_list.isra.0+0x450/0x450 [ 1249.490557] ? path_lookupat.isra.0+0xba0/0xba0 [ 1249.495241] ? do_dup2+0x580/0x580 [ 1249.498782] ? kasan_check_read+0x11/0x20 [ 1249.502928] ? do_raw_spin_unlock+0xa0/0x330 [ 1249.507351] ? do_raw_spin_trylock+0x270/0x270 [ 1249.511939] do_filp_open+0x26f/0x370 [ 1249.515734] ? may_open_dev+0x100/0x100 [ 1249.519696] ? strncpy_from_user+0x317/0x440 [ 1249.524102] ? digsig_verify.cold+0x32/0x32 [ 1249.528435] ? get_unused_fd_flags+0x122/0x1a0 [ 1249.532994] ? __alloc_fd+0x700/0x700 [ 1249.536790] ? getname_flags+0x277/0x5b0 [ 1249.540849] do_sys_open+0x59a/0x7c0 [ 1249.544547] ? filp_open+0x80/0x80 [ 1249.548087] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1249.553432] ? trace_hardirqs_off_caller+0x300/0x300 [ 1249.558518] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1249.563292] __x64_sys_open+0x7e/0xc0 [ 1249.567095] do_syscall_64+0x1a3/0x800 [ 1249.570996] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1249.575907] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1249.580911] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1249.585747] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1249.590916] RIP: 0033:0x457ec9 [ 1249.594130] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1249.613053] RSP: 002b:00007f782df97c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1249.620741] RAX: ffffffffffffffda RBX: 00007f782df97c90 RCX: 0000000000457ec9 [ 1249.627996] RDX: 0000000000000000 RSI: 0000000000000200 RDI: 0000000020000000 08:58:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xfeffffff00000000) [ 1249.635242] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1249.642494] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f782df986d4 [ 1249.649784] R13: 00000000004c3beb R14: 00000000004d6a00 R15: 0000000000000004 [ 1249.660142] audit: type=1804 audit(1546592298.409:86): pid=11014 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="bus" dev="sda1" ino=16661 res=1 [ 1249.721404] EXT4-fs: 2 callbacks suppressed [ 1249.721416] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i…ize=0x0000000000000000" or missing value 08:58:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xff01000000000000) 08:58:18 executing program 3 (fault-call:1 fault-nth:4): open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x0) 08:58:18 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, 0x0, 0x0) 08:58:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x800000000000000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_is\nze'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xff0f000000000000) [ 1249.912305] FAULT_INJECTION: forcing a failure. [ 1249.912305] name failslab, interval 1, probability 0, space 0, times 0 [ 1249.985068] CPU: 0 PID: 11038 Comm: syz-executor3 Not tainted 4.20.0+ #8 [ 1249.992015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1250.001372] Call Trace: [ 1250.003964] dump_stack+0x1db/0x2d0 [ 1250.007598] ? dump_stack_print_info.cold+0x20/0x20 [ 1250.012653] ? rcu_read_unlock_special+0x380/0x380 [ 1250.017593] should_fail.cold+0xa/0x15 [ 1250.021500] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1250.026627] ? ___might_sleep+0x1e7/0x310 [ 1250.030777] ? arch_local_save_flags+0x50/0x50 [ 1250.035377] __should_failslab+0x121/0x190 [ 1250.039620] should_failslab+0x9/0x14 [ 1250.043448] __kmalloc+0x2dc/0x740 [ 1250.046985] ? vsprintf+0x40/0x40 [ 1250.050467] ? path_openat+0x14d7/0x5650 [ 1250.054544] ? do_syscall_64+0x1a3/0x800 [ 1250.058620] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1250.064002] ? ima_write_template_field_data.isra.0+0x56/0x210 [ 1250.069985] ima_write_template_field_data.isra.0+0x56/0x210 [ 1250.075794] ima_eventdigest_init_common+0x17a/0x2a0 08:58:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0xa00000000000000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xffffff7f00000000) [ 1250.080897] ? ima_write_template_field_data.isra.0+0x210/0x210 [ 1250.086960] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1250.092499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1250.098092] ? rcu_read_lock_sched_held+0x110/0x130 [ 1250.103149] ? __kmalloc+0x5d5/0x740 [ 1250.106882] ima_eventdigest_ng_init+0x60/0x150 [ 1250.111580] ima_alloc_init_template+0x255/0x3b0 [ 1250.116374] ima_add_violation+0x1e7/0x390 [ 1250.120622] ? ima_store_template+0x360/0x360 [ 1250.125135] ? kmem_cache_alloc+0x341/0x710 [ 1250.129470] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1250.135039] ? ima_d_path+0xbf/0x1ee [ 1250.138761] process_measurement+0xdf4/0x1be0 [ 1250.143291] ? ima_add_template_entry.cold+0x48/0x48 [ 1250.148420] ? smack_task_getsecid+0x1ec/0x3d0 [ 1250.153006] ? find_held_lock+0x35/0x120 [ 1250.157073] ? smack_task_getsecid+0x1ec/0x3d0 [ 1250.161691] ? lock_downgrade+0x910/0x910 [ 1250.165841] ? kasan_check_read+0x11/0x20 [ 1250.169997] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1250.175279] ? rcu_read_unlock_special+0x380/0x380 [ 1250.180261] ? smack_task_getsecid+0x213/0x3d0 [ 1250.184844] ? smack_cred_getsecid+0x230/0x230 [ 1250.189438] ? do_dentry_open+0x932/0x1210 [ 1250.193673] ? privileged_wrt_inode_uidgid+0x68/0xd0 [ 1250.198801] ima_file_check+0xe3/0x130 [ 1250.202689] ? process_measurement+0x1be0/0x1be0 [ 1250.207447] ? inode_permission+0xb4/0x570 [ 1250.211691] path_openat+0x14d7/0x5650 [ 1250.215603] ? add_lock_to_list.isra.0+0x450/0x450 [ 1250.220571] ? path_lookupat.isra.0+0xba0/0xba0 [ 1250.225241] ? do_dup2+0x580/0x580 [ 1250.228791] ? kasan_check_read+0x11/0x20 [ 1250.232942] ? do_raw_spin_unlock+0xa0/0x330 [ 1250.237362] ? do_raw_spin_trylock+0x270/0x270 [ 1250.241959] do_filp_open+0x26f/0x370 [ 1250.245770] ? may_open_dev+0x100/0x100 [ 1250.249800] ? strncpy_from_user+0x317/0x440 [ 1250.254235] ? digsig_verify.cold+0x32/0x32 [ 1250.258564] ? get_unused_fd_flags+0x122/0x1a0 [ 1250.263146] ? __alloc_fd+0x700/0x700 [ 1250.266987] ? getname_flags+0x277/0x5b0 [ 1250.271057] do_sys_open+0x59a/0x7c0 [ 1250.274815] ? filp_open+0x80/0x80 [ 1250.278389] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1250.283755] ? trace_hardirqs_off_caller+0x300/0x300 [ 1250.288861] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1250.293622] __x64_sys_open+0x7e/0xc0 [ 1250.297429] do_syscall_64+0x1a3/0x800 [ 1250.301322] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1250.306260] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1250.311283] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1250.316340] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1250.321538] RIP: 0033:0x457ec9 [ 1250.324732] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1250.343631] RSP: 002b:00007f782df97c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1250.351340] RAX: ffffffffffffffda RBX: 00007f782df97c90 RCX: 0000000000457ec9 [ 1250.358612] RDX: 0000000000000000 RSI: 0000000000000200 RDI: 0000000020000000 [ 1250.365881] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1250.373151] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f782df986d4 08:58:19 executing program 3 (fault-call:1 fault-nth:5): open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x0) 08:58:19 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xffffffff00000000) [ 1250.380423] R13: 00000000004c3beb R14: 00000000004d6a00 R15: 0000000000000004 [ 1250.393405] audit: type=1804 audit(1546592299.139:87): pid=11038 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1521/bus" dev="sda1" ino=16704 res=0 [ 1250.526945] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_is [ 1250.526945] ze=0x0000000000000000" or missing value [ 1250.591947] FAULT_INJECTION: forcing a failure. [ 1250.591947] name failslab, interval 1, probability 0, space 0, times 0 [ 1250.605533] CPU: 0 PID: 11067 Comm: syz-executor3 Not tainted 4.20.0+ #8 [ 1250.612390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1250.621748] Call Trace: [ 1250.624354] dump_stack+0x1db/0x2d0 [ 1250.627995] ? dump_stack_print_info.cold+0x20/0x20 [ 1250.633021] should_fail.cold+0xa/0x15 [ 1250.636913] ? fault_create_debugfs_attr+0x1e0/0x1e0 08:58:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x7ff0) 08:58:19 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, 0x0, 0x0) 08:58:19 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xffffffffffffffe0) [ 1250.642015] ? ___might_sleep+0x1e7/0x310 [ 1250.646159] ? arch_local_save_flags+0x50/0x50 [ 1250.650740] ? ima_eventdigest_init_common+0x17a/0x2a0 [ 1250.656063] ? ima_write_template_field_data.isra.0+0x210/0x210 [ 1250.662185] __should_failslab+0x121/0x190 [ 1250.666436] should_failslab+0x9/0x14 [ 1250.670244] __kmalloc+0x2dc/0x740 [ 1250.673827] ? ima_write_template_field_data.isra.0+0x123/0x210 [ 1250.679900] ima_write_template_field_data.isra.0+0x123/0x210 [ 1250.685796] ima_eventname_init_common+0x13b/0x1b0 08:58:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0xe00000000000000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1250.690742] ima_eventname_ng_init+0x20/0x30 [ 1250.695185] ima_alloc_init_template+0x255/0x3b0 [ 1250.699990] ima_add_violation+0x1e7/0x390 [ 1250.704251] ? ima_store_template+0x360/0x360 [ 1250.708753] ? kmem_cache_alloc+0x341/0x710 [ 1250.713109] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1250.718664] ? ima_d_path+0xbf/0x1ee [ 1250.722389] process_measurement+0xdf4/0x1be0 [ 1250.726904] ? ima_add_template_entry.cold+0x48/0x48 [ 1250.732007] ? smack_task_getsecid+0x1ec/0x3d0 [ 1250.736592] ? find_held_lock+0x35/0x120 [ 1250.740659] ? smack_task_getsecid+0x1ec/0x3d0 [ 1250.745268] ? lock_downgrade+0x910/0x910 [ 1250.749416] ? kasan_check_read+0x11/0x20 [ 1250.753571] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1250.758863] ? rcu_read_unlock_special+0x380/0x380 [ 1250.763813] ? smack_task_getsecid+0x213/0x3d0 [ 1250.768398] ? smack_cred_getsecid+0x230/0x230 [ 1250.772994] ? do_dentry_open+0x932/0x1210 [ 1250.777277] ? privileged_wrt_inode_uidgid+0x68/0xd0 [ 1250.782384] ima_file_check+0xe3/0x130 [ 1250.786275] ? process_measurement+0x1be0/0x1be0 [ 1250.791029] ? inode_permission+0xb4/0x570 [ 1250.795310] path_openat+0x14d7/0x5650 [ 1250.799202] ? add_lock_to_list.isra.0+0x450/0x450 [ 1250.804162] ? path_lookupat.isra.0+0xba0/0xba0 [ 1250.808846] ? do_dup2+0x580/0x580 [ 1250.812388] ? kasan_check_read+0x11/0x20 [ 1250.816535] ? do_raw_spin_unlock+0xa0/0x330 [ 1250.820937] ? do_raw_spin_trylock+0x270/0x270 [ 1250.825521] do_filp_open+0x26f/0x370 [ 1250.829325] ? may_open_dev+0x100/0x100 [ 1250.833307] ? strncpy_from_user+0x317/0x440 [ 1250.837712] ? digsig_verify.cold+0x32/0x32 [ 1250.842030] ? get_unused_fd_flags+0x122/0x1a0 [ 1250.846602] ? __alloc_fd+0x700/0x700 [ 1250.850409] ? getname_flags+0x277/0x5b0 [ 1250.854471] do_sys_open+0x59a/0x7c0 [ 1250.858180] ? filp_open+0x80/0x80 [ 1250.861722] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1250.867105] ? trace_hardirqs_off_caller+0x300/0x300 [ 1250.872222] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1250.876978] __x64_sys_open+0x7e/0xc0 [ 1250.880777] do_syscall_64+0x1a3/0x800 [ 1250.884680] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1250.889624] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1250.894656] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1250.899519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1250.904733] RIP: 0033:0x457ec9 [ 1250.907956] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1250.926867] RSP: 002b:00007f782df97c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1250.934571] RAX: ffffffffffffffda RBX: 00007f782df97c90 RCX: 0000000000457ec9 [ 1250.941832] RDX: 0000000000000000 RSI: 0000000000000200 RDI: 0000000020000000 [ 1250.949100] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1250.956409] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f782df986d4 [ 1250.963675] R13: 00000000004c3beb R14: 00000000004d6a00 R15: 0000000000000004 08:58:19 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000000c0)={0xa59b, 0x80, 0x5}, 0xc) open(&(0x7f0000000080)='./bus\x00', 0x10000, 0x20) [ 1250.993070] audit: type=1804 audit(1546592299.739:88): pid=11067 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1522/bus" dev="sda1" ino=17857 res=0 08:58:19 executing program 3 (fault-call:1 fault-nth:6): open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x0) [ 1251.067313] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_is [ 1251.067313] ze=0x0000000000000000" or missing value 08:58:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_is\x85ze'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0xf00000000000000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1251.253602] FAULT_INJECTION: forcing a failure. [ 1251.253602] name failslab, interval 1, probability 0, space 0, times 0 [ 1251.300948] CPU: 0 PID: 11093 Comm: syz-executor3 Not tainted 4.20.0+ #8 [ 1251.307794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1251.317142] Call Trace: [ 1251.319739] dump_stack+0x1db/0x2d0 [ 1251.323383] ? dump_stack_print_info.cold+0x20/0x20 [ 1251.328409] ? rcu_read_unlock_special+0x380/0x380 [ 1251.333358] should_fail.cold+0xa/0x15 [ 1251.337282] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1251.342392] ? ___might_sleep+0x1e7/0x310 [ 1251.346540] ? arch_local_save_flags+0x50/0x50 [ 1251.351162] __should_failslab+0x121/0x190 [ 1251.355397] should_failslab+0x9/0x14 [ 1251.359208] __kmalloc+0x2dc/0x740 [ 1251.362758] ? vsprintf+0x40/0x40 [ 1251.366217] ? path_openat+0x14d7/0x5650 [ 1251.370278] ? do_syscall_64+0x1a3/0x800 [ 1251.374356] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1251.379725] ? ima_write_template_field_data.isra.0+0x56/0x210 [ 1251.385705] ima_write_template_field_data.isra.0+0x56/0x210 [ 1251.391514] ima_eventdigest_init_common+0x17a/0x2a0 [ 1251.396628] ? ima_write_template_field_data.isra.0+0x210/0x210 [ 1251.402684] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1251.408237] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1251.413799] ? rcu_read_lock_sched_held+0x110/0x130 [ 1251.418815] ? __kmalloc+0x5d5/0x740 [ 1251.422540] ima_eventdigest_ng_init+0x60/0x150 [ 1251.427225] ima_alloc_init_template+0x255/0x3b0 [ 1251.431990] ima_add_violation+0x1e7/0x390 [ 1251.436230] ? ima_store_template+0x360/0x360 [ 1251.440728] ? kmem_cache_alloc+0x341/0x710 [ 1251.445059] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1251.450598] ? ima_d_path+0xbf/0x1ee [ 1251.454317] process_measurement+0xdf4/0x1be0 [ 1251.458854] ? ima_add_template_entry.cold+0x48/0x48 [ 1251.463955] ? smack_task_getsecid+0x1ec/0x3d0 [ 1251.468534] ? find_held_lock+0x35/0x120 [ 1251.472594] ? smack_task_getsecid+0x1ec/0x3d0 [ 1251.477190] ? lock_downgrade+0x910/0x910 [ 1251.481353] ? kasan_check_read+0x11/0x20 [ 1251.485506] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1251.490787] ? rcu_read_unlock_special+0x380/0x380 [ 1251.495729] ? smack_task_getsecid+0x213/0x3d0 [ 1251.500322] ? smack_cred_getsecid+0x230/0x230 [ 1251.504904] ? do_dentry_open+0x932/0x1210 [ 1251.509149] ? privileged_wrt_inode_uidgid+0x68/0xd0 [ 1251.514259] ima_file_check+0xe3/0x130 [ 1251.518147] ? process_measurement+0x1be0/0x1be0 [ 1251.522898] ? inode_permission+0xb4/0x570 [ 1251.527135] path_openat+0x14d7/0x5650 [ 1251.531016] ? add_lock_to_list.isra.0+0x450/0x450 [ 1251.535971] ? path_lookupat.isra.0+0xba0/0xba0 [ 1251.540638] ? do_dup2+0x580/0x580 [ 1251.544182] ? kasan_check_read+0x11/0x20 [ 1251.548323] ? do_raw_spin_unlock+0xa0/0x330 [ 1251.552742] ? do_raw_spin_trylock+0x270/0x270 [ 1251.557326] do_filp_open+0x26f/0x370 [ 1251.561150] ? may_open_dev+0x100/0x100 [ 1251.565121] ? strncpy_from_user+0x317/0x440 [ 1251.569539] ? digsig_verify.cold+0x32/0x32 [ 1251.573868] ? get_unused_fd_flags+0x122/0x1a0 [ 1251.578444] ? __alloc_fd+0x700/0x700 [ 1251.582250] ? getname_flags+0x277/0x5b0 [ 1251.586328] do_sys_open+0x59a/0x7c0 [ 1251.590042] ? filp_open+0x80/0x80 [ 1251.593591] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1251.598962] ? trace_hardirqs_off_caller+0x300/0x300 [ 1251.604075] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1251.608837] __x64_sys_open+0x7e/0xc0 [ 1251.612667] do_syscall_64+0x1a3/0x800 [ 1251.616582] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1251.621513] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1251.626529] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1251.631375] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1251.636556] RIP: 0033:0x457ec9 08:58:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x2000) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x5e) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 1251.639744] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1251.658641] RSP: 002b:00007f782df97c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1251.666348] RAX: ffffffffffffffda RBX: 00007f782df97c90 RCX: 0000000000457ec9 [ 1251.673606] RDX: 0000000000000000 RSI: 0000000000000200 RDI: 0000000020000000 [ 1251.680875] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1251.688157] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f782df986d4 [ 1251.695423] R13: 00000000004c3beb R14: 00000000004d6a00 R15: 0000000000000004 08:58:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x1000000000000000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:20 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, 0x0, 0x0) [ 1251.763770] audit: type=1804 audit(1546592300.509:89): pid=11093 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1523/bus" dev="sda1" ino=17457 res=0 08:58:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf830ba9b9448aebba376c0a75dff27315e9ab8d25f92e6990056e0207fe4d451b62624a1be93d6951b9c42d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7bea3ae603def7f99defee0f55dd287483e308bfa8d9f93b69b2f3b7e0916d4adb266df3240872fc4c9f5e8d86a95ad9a6373915cfbd6f1cc80ce2dd29dda28a539929a959fe736c0c41515562"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x81bc) 08:58:20 executing program 3 (fault-call:1 fault-nth:7): open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x0) [ 1251.916103] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_is…ze=0x0000000000000000" or missing value 08:58:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0xfffffffffffffffe) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f0000000100)={0xb9dd, "4ea18acd0bf208ae61570b4d78486ef2084b1f3454423df24b1c48bf3d2edc53", 0x0, 0x100, 0x32b, 0x8, 0x5, 0x1, 0x5, 0x10000}) 08:58:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x6000000000000000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1252.003898] FAULT_INJECTION: forcing a failure. [ 1252.003898] name failslab, interval 1, probability 0, space 0, times 0 [ 1252.070865] CPU: 0 PID: 11122 Comm: syz-executor3 Not tainted 4.20.0+ #8 [ 1252.077713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1252.087055] Call Trace: [ 1252.087114] dump_stack+0x1db/0x2d0 [ 1252.087135] ? dump_stack_print_info.cold+0x20/0x20 [ 1252.087164] should_fail.cold+0xa/0x15 [ 1252.093362] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1252.093384] ? ___might_sleep+0x1e7/0x310 [ 1252.093398] ? arch_local_save_flags+0x50/0x50 [ 1252.093415] ? ima_eventdigest_init_common+0x17a/0x2a0 [ 1252.121405] ? ima_write_template_field_data.isra.0+0x210/0x210 [ 1252.127471] __should_failslab+0x121/0x190 [ 1252.131712] should_failslab+0x9/0x14 [ 1252.135518] __kmalloc+0x2dc/0x740 [ 1252.139094] ? ima_write_template_field_data.isra.0+0x123/0x210 [ 1252.145165] ima_write_template_field_data.isra.0+0x123/0x210 [ 1252.151051] ima_eventname_init_common+0x13b/0x1b0 [ 1252.155975] ima_eventname_ng_init+0x20/0x30 [ 1252.160382] ima_alloc_init_template+0x255/0x3b0 [ 1252.165141] ima_add_violation+0x1e7/0x390 [ 1252.169392] ? ima_store_template+0x360/0x360 [ 1252.173897] ? kmem_cache_alloc+0x341/0x710 [ 1252.178226] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1252.183806] ? ima_d_path+0xbf/0x1ee [ 1252.187522] process_measurement+0xdf4/0x1be0 [ 1252.192025] ? ima_add_template_entry.cold+0x48/0x48 [ 1252.197136] ? smack_task_getsecid+0x1ec/0x3d0 [ 1252.201712] ? find_held_lock+0x35/0x120 [ 1252.205768] ? smack_task_getsecid+0x1ec/0x3d0 [ 1252.210358] ? lock_downgrade+0x910/0x910 [ 1252.214499] ? kasan_check_read+0x11/0x20 [ 1252.218749] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1252.224039] ? rcu_read_unlock_special+0x380/0x380 [ 1252.228971] ? smack_task_getsecid+0x213/0x3d0 [ 1252.233546] ? smack_cred_getsecid+0x230/0x230 [ 1252.238145] ? do_dentry_open+0x932/0x1210 [ 1252.242391] ? privileged_wrt_inode_uidgid+0x68/0xd0 [ 1252.247494] ima_file_check+0xe3/0x130 [ 1252.251376] ? process_measurement+0x1be0/0x1be0 [ 1252.256125] ? inode_permission+0xb4/0x570 [ 1252.260386] path_openat+0x14d7/0x5650 [ 1252.264273] ? add_lock_to_list.isra.0+0x450/0x450 [ 1252.269220] ? path_lookupat.isra.0+0xba0/0xba0 [ 1252.273889] ? do_dup2+0x580/0x580 [ 1252.277452] ? kasan_check_read+0x11/0x20 [ 1252.281607] ? do_raw_spin_unlock+0xa0/0x330 [ 1252.286008] ? do_raw_spin_trylock+0x270/0x270 [ 1252.290591] do_filp_open+0x26f/0x370 [ 1252.294392] ? may_open_dev+0x100/0x100 [ 1252.298373] ? strncpy_from_user+0x317/0x440 [ 1252.302774] ? digsig_verify.cold+0x32/0x32 [ 1252.307098] ? get_unused_fd_flags+0x122/0x1a0 [ 1252.311678] ? __alloc_fd+0x700/0x700 [ 1252.315708] ? getname_flags+0x277/0x5b0 [ 1252.319764] do_sys_open+0x59a/0x7c0 [ 1252.323474] ? filp_open+0x80/0x80 [ 1252.327064] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1252.332433] ? trace_hardirqs_off_caller+0x300/0x300 [ 1252.337535] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1252.342288] __x64_sys_open+0x7e/0xc0 [ 1252.346099] do_syscall_64+0x1a3/0x800 [ 1252.350015] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1252.354937] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1252.359947] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1252.364805] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1252.370005] RIP: 0033:0x457ec9 [ 1252.373209] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1252.392113] RSP: 002b:00007f782df97c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1252.399816] RAX: ffffffffffffffda RBX: 00007f782df97c90 RCX: 0000000000457ec9 [ 1252.407078] RDX: 0000000000000000 RSI: 0000000000000200 RDI: 0000000020000000 [ 1252.414354] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1252.421620] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f782df986d4 [ 1252.428895] R13: 00000000004c3beb R14: 00000000004d6a00 R15: 0000000000000004 [ 1252.453650] audit: type=1804 audit(1546592301.199:90): pid=11122 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1524/bus" dev="sda1" ino=16526 res=0 08:58:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x9effffff00000000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1252.507182] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_is…ze=0x0000000000000000" or missing value 08:58:21 executing program 3 (fault-call:1 fault-nth:8): open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x0) 08:58:21 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x8000, 0x32000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.stat\x00', 0x0, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f0000000180)={0x5, 0x2, 0x1ff, 0x2, 0x3f}) syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0xdf, 0x800) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xf192, 0x80000) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f0000000200)=""/206) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:21 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isi\ne'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:21 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf830ba9b9448aebba376c0a75dff27315e9ab8d25f92e6990056e0207fe4d451b62624a1be93d6951b9c42d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7bea3ae603def7f99defee0f55dd287483e308bfa8d9f93b69b2f3b7e0916d4adb266df3240872fc4c9f5e8d86a95ad9a6373915cfbd6f1cc80ce2dd29dda28a539929a959fe736c0c41515562"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff02) 08:58:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0xbc0e000000000000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0xf0ffffff00000000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:21 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, 0x0, 0x0) 08:58:21 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x40000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000140)=0xe8) sendto$packet(r0, &(0x7f00000000c0)="aae66e7c877d0ceb8a2155496aefc61688668485727763df6f41131d43e635812ea6bb7a81e14eb7c93adca34dd5dd36cd093fb8245fbe72752cb5b3d83ae2384505972a9622ee5da4cbc9d4bbed146d116fd24974796757106f54150ffc58513c4890e34ec1cca6", 0x68, 0x20040010, &(0x7f0000000180)={0x11, 0x1f, r1, 0x1, 0xffffffffffff8000, 0x6, @random="9d948ad5b267"}, 0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:21 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x0) [ 1252.942680] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isi [ 1252.942680] e=0x0000000000000000" or missing value 08:58:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0xffffff7f00000000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x4) [ 1253.033208] audit: type=1804 audit(1546592301.779:91): pid=11176 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1526/bus" dev="sda1" ino=17419 res=1 08:58:21 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0xf0, 0x0) [ 1253.104749] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isi [ 1253.104749] e=0x0000000000000000" or missing value 08:58:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0xfffffffffffff000, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x7, 0x301240) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = open(&(0x7f0000000080)='./bus\x00', 0x2000, 0x80) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000100)={{0x2, 0x4e22, @loopback}, {0x307, @local}, 0x28, {0x2, 0x4e24, @local}, 'hsr0\x00'}) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isi\x85e'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 1253.516728] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isi…e=0x0000000000000000" or missing value 08:58:22 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2001005a) 08:58:22 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x202, 0x0) 08:58:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lremovexattr(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)=@random={'os2.', 'vboxnet1[\x00'}) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 1253.746938] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isi…e=0x0000000000000000" or missing value 08:58:22 executing program 5 (fault-call:28 fault-nth:0): ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x2, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) r1 = dup3(r0, r0, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x800) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000000)) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000200)='./bus\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', 0x0, 0xffffffbe, 0x0) 08:58:22 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x203, 0x0) 08:58:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isiz\n'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x800) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x80000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x3, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1253.984329] audit: type=1804 audit(1546592302.729:92): pid=11229 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1529/bus" dev="sda1" ino=17945 res=1 08:58:22 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x204, 0x0) [ 1254.112754] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz [ 1254.112754] =0x0000000000000000" or missing value 08:58:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x4, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1254.172889] FAULT_INJECTION: forcing a failure. [ 1254.172889] name failslab, interval 1, probability 0, space 0, times 0 [ 1254.195362] CPU: 0 PID: 11243 Comm: syz-executor5 Not tainted 4.20.0+ #8 [ 1254.202229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1254.211585] Call Trace: [ 1254.211880] audit: type=1804 audit(1546592302.959:93): pid=11247 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1530/bus" dev="sda1" ino=17945 res=1 [ 1254.214186] dump_stack+0x1db/0x2d0 [ 1254.214215] ? dump_stack_print_info.cold+0x20/0x20 [ 1254.245644] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1254.251213] should_fail.cold+0xa/0x15 [ 1254.255202] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1254.260316] ? ___might_sleep+0x1e7/0x310 [ 1254.264471] ? arch_local_save_flags+0x50/0x50 [ 1254.269062] __should_failslab+0x121/0x190 [ 1254.273304] should_failslab+0x9/0x14 [ 1254.277138] kmem_cache_alloc_node+0x265/0x710 [ 1254.281715] ? check_noncircular+0x20/0x20 [ 1254.285971] ? print_usage_bug+0xd0/0xd0 [ 1254.290033] __alloc_skb+0xf4/0x730 [ 1254.293678] ? skb_scrub_packet+0x440/0x440 [ 1254.297997] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1254.303018] ? tcp_current_mss+0x29d/0x410 [ 1254.307284] ? tcp_mtu_to_mss+0x4e0/0x4e0 [ 1254.311451] sk_stream_alloc_skb+0x147/0x9b0 [ 1254.316059] ? tcp_init_transfer+0x480/0x480 [ 1254.320477] ? tcp_fastopen_reset_cipher.cold+0x46/0x46 [ 1254.325856] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1254.330872] ? tcp_send_mss+0x173/0x2c0 [ 1254.334846] tcp_sendmsg_locked+0xe6e/0x3e80 [ 1254.339256] ? add_lock_to_list.isra.0+0x450/0x450 [ 1254.344183] ? print_usage_bug+0xd0/0xd0 [ 1254.348268] ? lock_sock_nested+0xac/0x120 [ 1254.352512] ? tcp_sendpage+0x60/0x60 [ 1254.356326] ? trace_hardirqs_on+0xbd/0x310 [ 1254.360646] ? lock_sock_nested+0xe2/0x120 [ 1254.364880] ? trace_hardirqs_off_caller+0x300/0x300 [ 1254.369983] ? check_preemption_disabled+0x48/0x290 [ 1254.374996] ? lock_sock_nested+0x9a/0x120 [ 1254.379236] ? __local_bh_enable_ip+0x15a/0x270 [ 1254.383908] tcp_sendmsg+0x30/0x50 [ 1254.387447] inet_sendmsg+0x1af/0x740 [ 1254.391290] ? ipip_gro_receive+0x100/0x100 [ 1254.395611] ? smack_socket_sendmsg+0xb1/0x1a0 [ 1254.400220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1254.405751] ? security_socket_sendmsg+0x93/0xc0 [ 1254.410506] ? ipip_gro_receive+0x100/0x100 [ 1254.414826] sock_sendmsg+0xdd/0x130 [ 1254.418544] sock_write_iter+0x379/0x5e0 [ 1254.422632] ? sock_sendmsg+0x130/0x130 [ 1254.426617] ? lock_downgrade+0x910/0x910 [ 1254.430763] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1254.436298] ? iov_iter_init+0xea/0x220 [ 1254.440276] __vfs_write+0x764/0xb40 [ 1254.443990] ? kernel_read+0x120/0x120 [ 1254.447888] ? __mutex_unlock_slowpath+0x195/0x870 [ 1254.452824] ? wait_for_completion+0x810/0x810 [ 1254.457416] ? rw_verify_area+0x118/0x360 [ 1254.461567] vfs_write+0x20c/0x580 [ 1254.465119] ksys_write+0x105/0x260 [ 1254.468746] ? __ia32_sys_read+0xb0/0xb0 [ 1254.472806] ? trace_hardirqs_off_caller+0x300/0x300 [ 1254.477909] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1254.482668] __x64_sys_write+0x73/0xb0 [ 1254.486555] do_syscall_64+0x1a3/0x800 [ 1254.490446] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1254.495406] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1254.500441] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1254.505302] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1254.510515] RIP: 0033:0x457ec9 [ 1254.513721] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1254.532611] RSP: 002b:00007f75b3a62c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1254.540328] RAX: ffffffffffffffda RBX: 00007f75b3a62c90 RCX: 0000000000457ec9 [ 1254.547593] RDX: 000000000000ff5a RSI: 0000000020000100 RDI: 0000000000000003 [ 1254.554856] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1254.562136] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f75b3a636d4 [ 1254.569403] R13: 00000000004c6f6a R14: 00000000004dc4a8 R15: 0000000000000005 [ 1254.609566] audit: type=1804 audit(1546592302.989:94): pid=11247 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1530/bus" dev="sda1" ino=17945 res=1 08:58:23 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x200080, 0x0) accept4$tipc(r2, &(0x7f00000001c0)=@id, &(0x7f0000000200)=0x10, 0x800) linkat(r2, &(0x7f0000000240)='./file0\x00', r2, &(0x7f0000000280)='./file0\x00', 0x400) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ioprio_get$pid(0x2, r3) 08:58:23 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x205, 0x0) 08:58:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isiz%'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 1254.939467] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz%=0x0000000000000000" or missing value 08:58:23 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:23 executing program 0: socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x7, 0x12040) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f00000000c0)={'tunl0\x00', 0x1, 0xff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x8) r2 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000023000)={&(0x7f0000000000), 0xc, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x1c, 0x20, 0x8aff, 0x0, 0x0, {0x9}, [@nested={0x8, 0x1, [@typed={0x4, 0x0, @binary}]}]}, 0x1c}}, 0x0) open(&(0x7f0000000200)='./bus\x00', 0x141042, 0xfffffffffffffffd) ioctl$KVM_RUN(r1, 0xae80, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x8, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:23 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x206, 0x0) 08:58:23 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x207, 0x0) [ 1255.088820] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz%=0x0000000000000000" or missing value 08:58:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0xa, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'bridge_slave_1\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) 08:58:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isiz\x85'}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 1255.245154] audit: type=1804 audit(1546592303.999:95): pid=11295 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1533/bus" dev="sda1" ino=17425 res=1 08:58:24 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x20a, 0x0) [ 1255.519879] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz…=0x0000000000000000" or missing value 08:58:24 executing program 1: r0 = socket$inet(0x2, 0x7, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000140)={0x2, 0x5e24, @broadcast}, 0xfffffffffffffcbd) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000040)={0x3f, @remote, 0x4e20, 0x0, 'lblc\x00', 0x8, 0xecc, 0x39}, 0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:58:24 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x9, &(0x7f0000000140)=[{0x100, 0x7f, 0x100000001}, {0x7, 0x7, 0x3f, 0x100000000}, {0xffffffff, 0xaf89, 0x80, 0x40}, {0x7f, 0x8, 0x9, 0x1000}, {0x9da, 0x8, 0x101, 0xba}, {0x9, 0x9, 0xffffffff, 0x8001}, {0x8, 0x4, 0xd38, 0x5}, {0x3, 0xffe0000000000000, 0x9, 0x6}, {0x3, 0x0, 0x8, 0x18}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) bind$unix(r1, &(0x7f00000000c0)=@file={0x1, './bus\x00'}, 0x6e) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0xe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:24 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x248, 0x0) 08:58:24 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x590) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0xa}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 1255.789059] audit: type=1804 audit(1546592304.539:96): pid=11326 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1535/bus" dev="sda1" ino=17950 res=1 08:58:24 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x24c, 0x0) 08:58:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0xf, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1255.852003] audit: type=1804 audit(1546592304.559:97): pid=11326 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1535/bus" dev="sda1" ino=17950 res=1 08:58:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='.\x00', 0x0, 0x10}, 0x10) [ 1255.934490] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize [ 1255.934490] 0x0000000000000000" or missing value [ 1256.006377] audit: type=1804 audit(1546592304.759:98): pid=11345 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1536/bus" dev="sda1" ino=17441 res=1 08:58:24 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xffffffffffff0000, 0x2001) ioctl$SCSI_IOCTL_START_UNIT(r2, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:58:24 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x268, 0x0) [ 1256.108480] audit: type=1804 audit(1546592304.789:99): pid=11345 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1536/bus" dev="sda1" ino=17441 res=1 08:58:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x10, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:25 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) listxattr(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)=""/47, 0x2f) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'bpq0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x12}}}) [ 1256.251841] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize [ 1256.251841] 0x0000000000000000" or missing value 08:58:25 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x26c, 0x0) [ 1256.286838] audit: type=1804 audit(1546592305.039:100): pid=11362 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1537/bus" dev="sda1" ino=16695 res=1 08:58:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x60, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:25 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x7ff8) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) [ 1256.350573] audit: type=1804 audit(1546592305.039:101): pid=11362 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1537/bus" dev="sda1" ino=16695 res=1 08:58:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x11}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:25 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x58576d23c10566f5, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) write$evdev(r1, &(0x7f0000000200)=[{{r2, r3/1000+30000}, 0x11, 0x0, 0xffff}, {{r4, r5/1000+30000}, 0x11, 0x8, 0xfffffffffffff2ea}, {{}, 0x15, 0x7f, 0x8}, {{0x0, 0x7530}, 0x15, 0x5d3, 0x7}, {{0x0, 0x2710}, 0x17, 0x1, 0x398d}, {{r6, r7/1000+30000}, 0x1f, 0x7, 0x80000001}], 0x90) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:25 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x274, 0x0) 08:58:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0xf0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1256.636463] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize0x0000000000000000" or missing value 08:58:25 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept(r0, &(0x7f0000000100)=@tipc, &(0x7f0000000180)=0x80) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000200)=[@in={0x2, 0x4e20, @multicast1}], 0x10) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) [ 1256.794395] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize0x0000000000000000" or missing value 08:58:25 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r0 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x800) ftruncate(r0, 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x215, &(0x7f0000f40ff8)}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:58:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x300, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:25 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x27a, 0x0) 08:58:25 executing program 0: r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) fcntl$setstatus(r0, 0x4, 0x2800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x139, 0x40000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'ip6_vti0\x00', 0x0}) recvfrom$packet(r2, &(0x7f00000000c0)=""/124, 0x7c, 0x10000, &(0x7f0000000200)={0x11, 0x1f, r3, 0x1, 0x8, 0x6, @remote}, 0x14) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x25}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:25 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x300, 0x0) [ 1257.342032] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize%0x0000000000000000" or missing value [ 1257.453340] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize%0x0000000000000000" or missing value 08:58:26 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x8200) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0xa00, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0xc0000, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f00000000c0), 0x4) r2 = getpgrp(0xffffffffffffffff) sched_setattr(r2, &(0x7f0000000100)={0x30, 0x3, 0x0, 0x0, 0x8000, 0x5, 0x838c, 0x709}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:26 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x0) 08:58:26 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x600, 0x0) 08:58:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x2a}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0xe00, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:26 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x80000, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_type(r1, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r3 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) ioctl$KVM_X86_SET_MCE(r3, 0x4040ae9e, &(0x7f0000000140)={0x480000000000000, 0x1f000, 0x7, 0x8, 0x15}) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000280)=0x6) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}) 08:58:26 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0xf00, 0x0) 08:58:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x400000, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 1257.778669] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize*0x0000000000000000" or missing value 08:58:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0xebc, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:26 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x1300, 0x0) 08:58:27 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x8408) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xd) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000100)=0xb) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0xf00, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:27 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:58:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x2d}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:27 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x2302, 0x0) 08:58:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000280)="bdab55c7208abb62fc60ef1d4b2dce1474cb9da6372960595c6b8162f64c43fdc2ad4aaefb5a15ade6c5f9aa9712113f664eeceb1f7b368fdd31be4b3f2ea6aa0f6b370d0ad5728ebf830bda3dcbe6286bb69b2d8a8157a3c5c0508d28d8d0a0f917bf320c1f7d7763dca3c90d98a76a4aa7e243ff9ad5be9470764c04b7a5b04c22989d705c02775953e3edd3ee0f984e17d4b68aef2273aa4d75a06fda447b6bf9f8e51cea768c7d4e52c2adb2da14c1edd725850fc4effd87afd9f4abbb37fb455129b6d784d78ba5a120b2e578e9ca75cd77cc13fd202b7ca756975597da66", 0xe1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$dupfd(r0, 0x406, r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x800000000) ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f00000001c0)={0x6, 0x0, 0x9, 0x2, 0x4}) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f00000000c0), &(0x7f0000000100)=0xc) lsetxattr$trusted_overlay_origin(&(0x7f0000000240)='./bus\x00', &(0x7f0000000180)='trusted.overlay.origin\x00', 0x0, 0xffffffffffffffc2, 0x400) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000140)={0x5, &(0x7f0000000040)=[{}, {}, {}, {}, {}]}) 08:58:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x6000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:27 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000000080)=0x4) 08:58:27 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x3a00, 0x0) 08:58:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0xbc0e, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:27 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0xc02, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000100)=0x1ac) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x81, 0x10200) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400204) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 1259.093916] kauditd_printk_skb: 12 callbacks suppressed [ 1259.093927] audit: type=1804 audit(1546592307.839:114): pid=11529 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1546/bus" dev="sda1" ino=17960 res=1 [ 1259.152415] audit: type=1804 audit(1546592307.879:115): pid=11529 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1546/bus" dev="sda1" ino=17960 res=1 08:58:28 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2001005a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3b}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:28 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x4000, 0x0) 08:58:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0xf000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x7ff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000600)={{0x6, 0x1, 0x400, 0x6, 'syz0\x00', 0x5}, 0x1, [0x2, 0x3, 0xac, 0xd9d, 0x5, 0xffffffffffffa2f7, 0x3, 0x9, 0x8, 0x1ffe0000000, 0x4, 0x800, 0x1, 0x7, 0x4, 0x8, 0x10000, 0x3e, 0x2, 0x5, 0x7, 0x0, 0x100, 0x5, 0x3f, 0x8cdc, 0x80, 0x8, 0xfffffffffffffff8, 0xf1, 0x8, 0x0, 0x7, 0x7, 0x9, 0x1, 0x1ff, 0x9, 0xbd0b, 0x5, 0x100000000, 0x20, 0xffffffffffffff00, 0x1, 0x100000001, 0xfffffffffffffff8, 0x7, 0xfffffffffffffffa, 0xffffffffffffffb6, 0x5, 0x5c17, 0x20, 0x9, 0x7ff, 0x0, 0x1000, 0x6d, 0x400, 0xa6f, 0x1, 0x401, 0x2, 0x1, 0x7f, 0x1f, 0xffffffffffff0000, 0x8, 0x100, 0x0, 0x4, 0x4, 0x1f, 0x80, 0x80000000800, 0x4, 0xa9, 0x9, 0x9, 0x1, 0xffff, 0x5, 0xcc0, 0x81, 0x1, 0x7f, 0xffff, 0x4, 0x7, 0x155b, 0x10000, 0x5, 0x7ff, 0x0, 0x3649, 0x73f7, 0x2, 0xd83, 0x2, 0x9, 0x6, 0x8001, 0xfffffffffffffffb, 0x7, 0x1f, 0x9, 0x40, 0x8, 0x9, 0x80000000, 0x20206022, 0x8, 0x0, 0x5, 0xff, 0x0, 0x800, 0x1, 0x3f, 0x3f, 0x6, 0x8, 0xedd, 0x100000001, 0x40, 0x100, 0x8001, 0x0, 0x10001], {0x77359400}}) mount$9p_fd(0x0, &(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='9p\x00', 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_loose='cache=loose'}], [{@appraise='appraise'}]}}) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000280)={{0x3b, @remote, 0x4e23, 0x3, 'dh\x00', 0x30, 0xffff, 0x4e}, {@dev={0xac, 0x14, 0x14, 0x1b}, 0x4e24, 0x10000, 0x4, 0x6, 0xffffffff}}, 0x44) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:28 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0xff0f, 0x0) [ 1259.472684] audit: type=1804 audit(1546592308.219:116): pid=11546 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1547/bus" dev="sda1" ino=17993 res=1 08:58:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket(0x4, 0x5, 0x7ff) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 1259.533343] audit: type=1804 audit(1546592308.219:117): pid=11546 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1547/bus" dev="sda1" ino=17993 res=1 08:58:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x30000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1259.678014] audit: type=1804 audit(1546592308.429:118): pid=11561 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1548/bus" dev="sda1" ino=17991 res=1 08:58:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:28 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0xb440000, 0x0) 08:58:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x34000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:58:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x400300, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x85}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:29 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x2) 08:58:29 executing program 5: ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000003c0)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000340), 0xfffffff7) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:29 executing program 0: r0 = socket(0xa, 0x3, 0x7) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000600), &(0x7f0000000640)=0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:29 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x19ac) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 1261.003577] audit: type=1804 audit(1546592309.749:119): pid=11597 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1550/bus" dev="sda1" ino=18005 res=1 08:58:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0xf0ffff, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1261.060063] EXT4-fs: 5 callbacks suppressed [ 1261.060075] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize…0x0000000000000000" or missing value 08:58:29 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x3) 08:58:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x8000, 0x0) ioctl$UI_SET_PHYS(r1, 0x4008556c, &(0x7f00000000c0)='syz1\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x26) lsetxattr$trusted_overlay_redirect(&(0x7f0000000180)='./bus\x00', &(0x7f00000004c0)='trusted.overlay.redirect\x00', &(0x7f0000000500)='.\x00', 0x2, 0x3) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f0000000100)='erofs\x00', &(0x7f0000000140)='./bus\x00', 0x1000, 0x3, &(0x7f0000000440)=[{&(0x7f0000000200)="802c9ef7735643edaa080b18ff508efffadd910f55131c5c6d2561ac4f89472fb97fff8be9e6fbbcd57edaa91bc09dff97e39295aab1e87464123435d1128d204ee1f9d267642b4b24ea8a030670621ddc5d99b22dad6046f77b00ea8565b79df5f4892daec77df21ba8e69ca49fad7911ad8a969eae68b50bf3f93b0a8738fe1e1b851bb6", 0x85}, {&(0x7f00000002c0)="0036c453ab1322f62f49403bbabe45d10920c67dddaf163256b413fbe1d5946bf80cab2d68ac363f32838e896f27e1574201d51fe0beb941a6b41e6f63f4789681e5f95d10923ea29d6b652b47afa1ac598d73f40b79937eb9c9c0e722f731cd562217706acbef74659102ac8e4afc79ccf0044a1b4fabc80a3a82ca8ba7b956bbac5bba7bdad4f8b13051f301a1dffedf0a322037647390d5c1089d53fc02a31d82f9eeee020dfe9b18dc877322c71d1c4e1dbee946da0433", 0xb9, 0x8}, {&(0x7f0000000380)="15036fb797224427731dd46d0b6b74fafde284c73f14abb26906d424aba6ca5e2b84f6ee61e17bf218bd3a668b7d35afa0de10ff3203af60a4812710dffc1a088876aeda510690b4ebc2948786a6e1c741719c4e11a09ad22cd99adc18c84d6b6f0f58a288e381992a5ae7cb5f5f2ded5cb9b1559bdc10c38c5414cd4078b17bae2e6b8bcdc760e0c727d92867834110207dd968d189f0ae9354f469c6e4dfb12f5a4f73ec98d9dc5291ff", 0xab}], 0x0, &(0x7f0000000600)={[{@noacl='noacl'}, {@fault_injection={'fault_injection', 0x3d, 0x5}}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@noacl='noacl'}, {@fault_injection={'fault_injection', 0x3d, 0x20}}, {@user_xattr='user_xattr'}, {@acl='acl'}, {@noacl='noacl'}], [{@audit='audit'}, {@obj_role={'obj_role', 0x3d, 'trusted.overlay.origin\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'trusted.overlay.origin\x00'}}, {@fsname={'fsname', 0x3d, 'bdev*nodevbdev\x06^)vboxnet1['}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x33, 0x7b, 0x77, 0x3e, 0x0, 0x71, 0x37], 0x2d, [0x36, 0x30, 0x37], 0x2d, [0x34, 0x37, 0x77, 0x63], 0x2d, [0x39, 0x36, 0x38, 0x77], 0x2d, [0x0, 0x65, 0x0, 0x64, 0x75, 0x77, 0x7f, 0x62]}}}, {@subj_role={'subj_role', 0x3d, '%ppp0\xffproc:['}}, {@seclabel='seclabel'}]}) [ 1261.122680] audit: type=1804 audit(1546592309.749:120): pid=11597 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1550/bus" dev="sda1" ino=18005 res=1 08:58:29 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x200080, 0x0) write$P9_RLOCK(r1, &(0x7f0000000080)={0x8, 0x35, 0x2, 0x1}, 0x8) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 1261.247631] audit: type=1804 audit(1546592309.999:121): pid=11620 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1551/bus" dev="sda1" ino=18004 res=1 08:58:30 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x4) [ 1261.310177] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize…0x0000000000000000" or missing value 08:58:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x1000000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1261.400047] audit: type=1804 audit(1546592309.999:122): pid=11620 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1551/bus" dev="sda1" ino=18004 res=1 08:58:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000200)) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:30 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x5) [ 1261.528735] audit: type=1804 audit(1546592310.249:123): pid=11635 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1552/bus" dev="sda1" ino=17999 res=1 [ 1261.885815] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000002,noquota,auto_da_alloc=0x0000000000000000, [ 1261.990211] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000002,noquota,auto_da_alloc=0x0000000000000000, 08:58:30 executing program 5: accept$inet(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000400)=0x10) socket$vsock_stream(0x28, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/mixer\x00', 0x80, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x200000, 0x40) ioctl$sock_FIOGETOWN(r0, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r1, &(0x7f0000000580)={0x2, 0x4e23, @multicast1}, 0xfffffffffffffe53) fcntl$getownex(r1, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r2 = getpgrp(0x0) rt_sigqueueinfo(r2, 0x400024, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r1, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r5 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r5, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r1, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r5, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r5, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x2000000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f00000000c0)={0x3f, 0x1}) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:30 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x6) 08:58:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000005c0)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10040000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0xa0, r1, 0x6, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffeffff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xb5a}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x40}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x827}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x41}, 0x4040010) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_elf32(r2, &(0x7f00000009c0)=ANY=[], 0x0) setsockopt(r2, 0x1, 0x2, &(0x7f0000000440)="2a1fd55e74b8f11d9bec3baab43e8325f614c87504560f3d57544796bbcb85a3655d0a510d801452", 0x28) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/stat\x00') setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x2, &(0x7f0000000080)=[{0x7, 0x10001, 0x9, 0x3}, {0x0, 0x10001, 0x1000, 0x7}]}, 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f00000003c0)=[@in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e20, 0x8, @dev={0xfe, 0x80, [], 0xa}, 0x4}], 0x2c) 08:58:31 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x200000, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0xfffffffffffffffc, 0x400042) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f0000000200)={0x4, r1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x5, 0x70, 0x3, 0x9, 0x76647804, 0x47c5, 0x0, 0x8000, 0x10440, 0xe, 0x3, 0xaf, 0x8000, 0x864, 0x20, 0xfffffffffffffffb, 0x7, 0x8, 0xfffffffffffff801, 0x6d, 0x6, 0x5, 0x3f, 0x90af, 0x7, 0x9, 0x7, 0x33d, 0x81, 0xfffffffffffffffa, 0x7fff, 0x713, 0x8, 0x6, 0x1, 0x3, 0x100000001, 0x8, 0x0, 0x100, 0x7, @perf_bp={&(0x7f0000000080), 0x3}, 0x1002, 0x3, 0xfffffffffffffffe, 0x9, 0x10000, 0x4, 0x7fffffff}, r3, 0xe, r3, 0x4) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:31 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x7) 08:58:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x3000000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:31 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0xa) [ 1262.487818] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000003,noquota,auto_da_alloc=0x0000000000000000, 08:58:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./bus\x00', 0x8, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000100)="388eea360382cb074a2af83ae40cadbe94", 0x11, 0x4}, {&(0x7f0000000200)="d38e187b1648762835e546f11162bc856aa3311a408dbcd9a63cf94278f4fb00b402c44602810de67fbba27274018f2e2418fb70a3893d8cf6cdb18cc2d8b2f8dabb35897062d77c1a0275f33470388ffdefd719ca7b5eb7cf545361f4377d5608a88a09d96e9c821934217411dfcf4e2e7845a47a8089fc0c6898bba3273b8d4699f13f05b4747d5bfea2dba21dc3efc840148c979bd9e38993c78b52ba38f37c20658dc9f98ec2bba5e1cc5737334360ca5ff232b0a7ee685c7d728f762a946342e187edb812c9b40a5b904eda68c142cd93512570cdded2e1b896b998cb18159a694eda9b2020ee86339d0992", 0xee, 0x8}, {&(0x7f0000000300)="af22c320be975aab869f82a873123f9717937e526d0bc203093c07db66a4fb8c46d1dd49ee80a803ee665a58dd69c85fb7190d838ec0fc6c31590c283667cee10fae25defa05c76ffd1903ae58ea98bd370f107fef55fbf1526428a71193f9e4922fce27037156dc730dcf7f8e66333e7414eca69845333fce0cfa0f92a7121e00d7818f64e1132c12cd164f6f0a41fe0380dd62d1b3c17f60ede71c9137a5dfbf", 0xa1, 0x2}, {&(0x7f0000000140)="9dbd6c15d2646814f7c3", 0xa, 0x6}, {&(0x7f00000003c0)="a455f16eb6ee0c7dddc2a4e1bca77850cae4ead740d6182bda404f780119681aee5b82a46c2f8d04d823310533ffbbf694a08bcf7bb55ebf0ab922db4d1e3835cb37bb66211cf7cbd24a0d3cbd72fcbd44b36f5dd5a831b8ea5b3ec71e7c1eb209e40486025d95935785f9456841c03b380cf3ce21e669f4d7a70f0553c030e136bb211d44a62863e259af563995d3f8fa7aa9251b2a2a1720e6b3c83009493b05642ea692cea56bf5a4081fbad63dd04138b7c08ca9415bba64b46df583b898f97773b1a8a6c1fa4eba29a0dabe273acfc1fdd3d8a9932be7563d31d75514bc41f12f4ae0adca3b8f76ab135e769a3158c8a3511ba707b73b45e48b", 0xfc, 0x6}], 0x800000, &(0x7f0000000600)={[{@umask={'umask', 0x3d, 0x3}}, {@utf8='utf8'}, {@show_sys_files_yes='show_sys_files=yes'}, {@utf8='utf8'}, {@utf8='utf8'}, {@show_sys_files_yes='show_sys_files=yes'}, {@fmask={'fmask'}}], [{@dont_appraise='dont_appraise'}, {@appraise_type='appraise_type=imasig'}, {@subj_type={'subj_type', 0x3d, 'bdevlo'}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) bind$pptp(r1, &(0x7f0000000180)={0x18, 0x2, {0x2, @loopback}}, 0x1e) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:31 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 1262.657558] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000003,noquota,auto_da_alloc=0x0000000000000000, 08:58:31 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x3e6, &(0x7f0000000100)}, 0xb2) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0xa}}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r3 = socket$inet(0x2, 0x2, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x800, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000180)={0x101ff, 0x3, 0x0, 0x1000, &(0x7f0000fff000/0x1000)=nil}) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f0000000140)="89130400004514ad773f717ff3f3768e83", 0x11) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10, r3, 0x0) clock_gettime(0x0, &(0x7f0000000040)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x70000, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r6 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$TCSBRK(r6, 0x5409, 0x101) 08:58:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x4000000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:31 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x4}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:31 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x48) 08:58:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x8000000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:31 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x4c) 08:58:31 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x400000, 0x0) r1 = accept$nfc_llcp(r0, &(0x7f0000000080), &(0x7f0000000140)=0x60) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000200)="0859d9a753b7bc3aaef348476d26e50ef016a85d0b9054d6b61c28fd7bd9871f475736d2aa88c89b0d59fbfa4c558b6b1e424983d1dfe3f34327e3131b0673a5bdd94cdb41a54b23dc90e8beadd841e52ae638e9481214e1bedf79d71c9e5bbb18f0133804523416f8721ef25155dc79085edb07d149e99c46f08147f7f764a1bab94151c65143f847532ebfef4919e39ee5da4c0f65000f4fc9ff5900d9364b003a3785634856e16a42ba12ac49c2212aa2f85f562b1c06218f4372623fa58e9590342a8f5bd8d982e1535eee6867717abdd67f8ab95ba9b3052e8bc4c62c19c3310ee399cfbc10eb72daebfb2f4508710a14ba211418e9619c7ec61ab60d0e") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80000, 0x0) ioctl$SIOCNRDECOBS(r3, 0x89e2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) socket$kcm(0x29, 0x5, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0xa000000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1263.076918] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000004,noquota,auto_da_alloc=0x0000000000000000, 08:58:31 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x68) [ 1263.168870] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000004,noquota,auto_da_alloc=0x0000000000000000, 08:58:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)) r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x20000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x100000004) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:32 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x180, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400201) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:58:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0xe000000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:32 executing program 5: socket$can_raw(0x1d, 0x3, 0x1) socket$nl_route(0x10, 0x3, 0x0) accept4$bt_l2cap(0xffffffffffffff9c, &(0x7f0000000400), &(0x7f0000000480)=0xe, 0x80000) syz_init_net_socket$ax25(0x3, 0x3, 0xca) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r1, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r2 = getpgrp(0x0) rt_sigqueueinfo(r2, 0x400024, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000003c0)={0x2, 0x4e23, @multicast2}, 0xfffffffffffffee8) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r1, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x81, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r5 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r5, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r1, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r5, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r5, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:32 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x6c) 08:58:32 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x484000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x260, r1, 0x300, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x88, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x84a4}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7628}]}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA={0x74, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4b3427e0}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8d7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4000000000000000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA={0x84, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfa4}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffff5819}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffb2f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffff6e8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1c0}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6aa9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x37fe}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'ifb0\x00'}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x914d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}]}]}, 0x260}, 0x1, 0x0, 0x0, 0x40850}, 0x4008000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 1263.609552] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000005,noquota,auto_da_alloc=0x0000000000000000, 08:58:32 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x74) 08:58:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0xf000000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:32 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r1) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000040)={&(0x7f0000ff9000/0x4000)=nil, 0x101, 0x2, 0xbc, &(0x7f0000ff8000/0x4000)=nil, 0x8001}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:58:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) setxattr(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', 0x17, 0x2) [ 1263.733412] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000005,noquota,auto_da_alloc=0x0000000000000000, 08:58:32 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x7a) 08:58:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x10000000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$nfs4(&(0x7f0000000080)='nfs4\x00', &(0x7f00000000c0)='./bus\x00', 0x100000001, 0x9, &(0x7f0000000800)=[{&(0x7f0000000100)="ca14e318abe53a9c2fa11886bddebfa3efa95a128cf5de239380deb48f880efa4cd3f818f87af8737489a7a5483fa2d97e821fb2f10cc613ebd57fdf8199462dc0c6249118f5ee77f7033a45cdf7c40d80d6b10bc0b2d9cf4bc31196ada28c985adc0295642e10f4920bfd21e4796708f2e4eb7ff1038cb6ab95721063a4a4e38c17cd5ef8fcfddaafeba76a90a5f0d695598bd302fa87a57a4f203746ef3d03f439a1d9f7a1cc09abc4", 0xaa, 0x6}, {&(0x7f0000000200)="cc06d7892875c669ba8682b84584a62c3bba7848c1847db6b42b20efca2b8421b485ecf0cc98c13c004cbf9a7933a559493550342f0babe0437558641ffc2c4801bf012fe7280169d11c51365050339b74a4d5aa34611ce3a609874cf43d75c68cf3e375c22cabb3c9e00e8cb57c37c7dd0b4cabfc0670313ea9851c1d3eb8f08ab2e68eb9c064e0fe5f4e0706291a7b01033664f12cc824", 0x98, 0x7f}, {&(0x7f00000002c0)="9c6703d381c67eebac7c10821bdf57cf0e153c327dd062aa161b9e46fe6b0b9d", 0x20, 0x80000001}, {&(0x7f0000000300)="d8d9a965571a077f07459858dfbcaefa35e1ccbd50ff5a6780bdd6273ee01a1a23705f67e4fa26c39cb3b9c07fcc51bb9db71690d2fbe3a88910435ac297332681cb3ba997cb953f992455d7191c668f5e54c1a997e408e774f3cadd828f445c4708eae12ee1d4df33538b0fd7200d65aea1a8d23275f5673c1901a84af7be4d7e9d7b04403c1aafba1a984c7352d33b401565f1232be18e771b06a4880fba8097fb83c8c75c9caa7b97d8", 0xab, 0x9}, {&(0x7f00000003c0)="c4bcfd47ba867d29b74701fd6f2fdc9d8fbfaf84fae17935a1f8cceb049643f5d2b85dc58c311ace7c6661b5b2d5207ddca115792938474d3d70b1679672695bd0250a88b1e29a0a1a561150405ea6a3ad414a3f03b6e6214227e46f9167f4177c83e3da39b971140cac43b53c8d7bcf28f97e1724eb8075ab4d1f421a60e71a356de7baab31844f8c880b43dde7693f43afebaffe790cb72138ecce94550afb32439b7cb614319cb00b83af8e77f202f8a535aeb266e071f0a48d6d36afececf9c177886da8e1", 0xc7, 0x7}, {&(0x7f00000004c0)="ab9edfabc66c17cf5edee60a530fa18ec06a07849c0d42f238e2905eb52dd855f3869a0c1d5fe559d638a0845b3d3ada6f612607e97ce1889b48309a44fe2e5029b1fa6915", 0x45, 0xf3e}, {&(0x7f0000000540)="c794fc9abb08b144fc11615da2629e0856cc93450553d26961dc4e30994907be3a2115bb5268a26c0dae0a79e9247a47a5ff1fd708ede793fe8e97108a8850f9c57bc3e26531d5f1e9459fe2a608e2cedf6efb4196fee5dd701e6240d5d144dd8651721a8d3e9eb38bee53f671cb0aee977169", 0x73, 0xe000000000000000}, {&(0x7f0000000600)="5ceab659f886b03daebb889da6c3bf270622ae796d2fb4608a5da3fcbd5acaf48fc832a9c358bebf49a590163223b6982e84a88759204c53ddbc9d4b095b9aee5afddbe2ddfcc22eb1a7aa14a0e0a138a8a28735225afb139f4f324cdb168eb9aa7a1cbc36aab53031f125475a4ca11622139f9982e25a4355e8be5b15dc265707ba5264dcf1d2832cdf0badba24bc557f5ae692f1640f00daf82360fe17a9add0f435d9496c318569313561e17de3f3b8a804885535a5dd83ae044de8a4871277cbb50a7f6cc3dbd550a76e", 0xcc, 0x4}, {&(0x7f0000000700)="7fd6630a8292e92bb66a1fe698ae920c7912d541b39f5c8b17f73f9bc8a18a8319fd042e13300667d7fbd82cc3a8d9627c58f2418f409d769964cb880dddac2a15ff9c33f188eebe3f83c806e70b76b3156e85ab374465975d6dd16776384404c0249281b83d60c97b96a7cf03b7709f086f7455ba3b9767cfcf58e722fa9ddbc34c1d3f721960a524215701da257737dc401e8d3faf1b05477e78c6993d590993af39a35b66e0a38c27cc3d45a3904a4f866edc1cbadd56663d43b758e22efa98107bd07e4a99f6db0c990ac7a98ffb75535b6c939de83a1599e0a70763fecc8bcdd0063da2c9178f38191e674ef5e3dff8b75cadc7ff", 0xf7, 0x753c}], 0x1040000, &(0x7f0000000900)='\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:32 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x300) [ 1264.318592] kauditd_printk_skb: 21 callbacks suppressed [ 1264.318604] audit: type=1804 audit(1546592313.069:145): pid=11813 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1563/bus" dev="sda1" ino=16731 res=1 08:58:33 executing program 5: accept$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) accept$ax25(0xffffffffffffff9c, &(0x7f0000000340)={{}, [@default, @remote, @bcast, @remote, @bcast, @rose, @rose, @netrom]}, &(0x7f00000003c0)=0x48) r0 = socket$pptp(0x18, 0x1, 0x2) ioctl$sock_FIOGETOWN(r0, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)={0x0, 0x5}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r1, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x2003fff, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, 0x0, &(0x7f0000000080)) futex(&(0x7f00000006c0), 0x0, 0x2, 0x0, 0x0, 0x2) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r3 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, 0x0) memfd_create(&(0x7f00000000c0)='\x00', 0x3) bind$can_raw(r3, &(0x7f0000000140), 0x10) setsockopt(r3, 0x65, 0x1, &(0x7f0000000080), 0x1d0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) modify_ldt$write2(0x11, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000100)=[@in6={0xa, 0x4e22, 0xa3, @local, 0x1}], 0x1c) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, 0x0) fchdir(r3) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) close(r3) sendmsg$can_bcm(r2, 0x0, 0x8000000012) unshare(0x40000000) futex(0x0, 0x9, 0x0, &(0x7f0000000040), 0x0, 0x2) 08:58:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x5, 0x5) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000080)={'raw\x00', 0x4c, "9a6345a61b470771c6ecf4466f3412a949bd3b12bf817bd2737485055216e82220077b78ca4a7c28317528fbdc13962da6ef90c37e99235edfa88423aaadefee44938469c642362a42087bcf"}, &(0x7f0000000100)=0x70) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x60000000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:33 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x408) [ 1264.368300] audit: type=1804 audit(1546592313.099:146): pid=11813 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1563/bus" dev="sda1" ino=16731 res=1 [ 1264.524420] audit: type=1804 audit(1546592313.269:147): pid=11832 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1564/bus" dev="sda1" ino=18021 res=1 [ 1264.564412] audit: type=1804 audit(1546592313.299:148): pid=11832 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1564/bus" dev="sda1" ino=18021 res=1 08:58:33 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080)=0x6, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf830ba9b9448aebba376c0a75dff27315e9ab8d25f92e6990056e0207fe4d451b62624a1be93d6951b9c42d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7bea3ae603def7f99defee0f55dd287483e308bfa8d9f93b69b2f3b7e0916d4adb266df3240872fc4c9f5e8d86a95ad9a6373915cfbd6f1cc80ce2dd29dda28a539929a959fe736c0c41515562"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x80, 0x103082) ioctl$SIOCGETLINKNAME(r2, 0x89e0, &(0x7f00000001c0)={0x4, 0x3}) ioctl$RTC_AIE_OFF(r2, 0x7002) 08:58:33 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x500) 08:58:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x9effffff, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x440140) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000000c0)={0x7, 0xf, 0x4, 0x4040040, {0x77359400}, {0x7, 0x8, 0xbb4c, 0x401, 0x6, 0xfffffffffffffff7, "70d2c2b9"}, 0x7, 0x2, @userptr=0x7fffffff, 0x4}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x8}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:33 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x600) [ 1264.908594] IPVS: ftp: loaded support on port[0] = 21 [ 1264.922279] audit: type=1804 audit(1546592313.669:149): pid=11855 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1565/bus" dev="sda1" ino=18020 res=1 08:58:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0xbc0e0000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1265.027717] audit: type=1804 audit(1546592313.669:150): pid=11855 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1565/bus" dev="sda1" ino=18020 res=1 [ 1265.093325] audit: type=1804 audit(1546592313.839:151): pid=11867 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1566/bus" dev="sda1" ino=18001 res=1 [ 1265.249046] audit: type=1804 audit(1546592313.839:152): pid=11867 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1566/bus" dev="sda1" ino=18001 res=1 [ 1265.463532] IPVS: ftp: loaded support on port[0] = 21 08:58:35 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xa0) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:35 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, &(0x7f0000000100)={0x1, 0x0, 0x2, 0x3, {0x81, 0x9, 0x1f, 0x3}}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200000, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000040)=0x20) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000080)=0xff) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) 08:58:35 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0x8000000000000eb}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf830ba9b9448aebba376c0a75dff27315e9ab8d25f92e6990056e0207fe4d451b62624a1be93d6951b9c42d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7bea3ae603def7f99defee0f55dd287483e308bfa8d9f93b69b2f3b7e0916d4adb266df3240872fc4c9f5e8d86a95ad9a6373915cfbd6f1cc80ce2dd29dda28a539929a959fe736c0c41515562"], 0x260) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000001c0)={0x0, 0x75, "968a5cbf16d72fb96b6626e80abc2ccf1aa858449f6ebed71730ca7421a5b0ce17573747a41bd0367a7854431c03e210b2367dd47d458b9bed74241c4a830e8c86df1eaf5b370fd0d5f1dc7cc5a8007b6abe61ae8ccc648042d8209e9552e02ad6d82bf719010d83d759c1357ae5fc71d35c0e8f8f"}, &(0x7f0000000080)=0x7d) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000140)={r3, 0x3}, &(0x7f0000000240)=0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:58:35 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x700) 08:58:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x9}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0xf0ffffff, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1267.227817] audit: type=1804 audit(1546592315.979:153): pid=11885 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1567/bus" dev="sda1" ino=16592 res=1 08:58:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f00000000c0)={0x7, 0x7, 0xa8d}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:36 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x804) [ 1267.285772] EXT4-fs: 6 callbacks suppressed [ 1267.285786] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000009,noquota,auto_da_alloc=0x0000000000000000, [ 1267.292468] audit: type=1804 audit(1546592315.999:154): pid=11885 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1567/bus" dev="sda1" ino=16592 res=1 08:58:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0xfffff000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:36 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0xa00) 08:58:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f0000000000)) lsetxattr$trusted_overlay_origin(&(0x7f0000000100)='./bus\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', 0x0, 0xffffffffffffff3c, 0xffffffffffffffff) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000040)={0x5, 0x4, 0x1}) [ 1267.469238] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000009,noquota,auto_da_alloc=0x0000000000000000, 08:58:36 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x2000) 08:58:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x10}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0xffffff7f, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1268.030447] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000010,noquota,auto_da_alloc=0x0000000000000000, 08:58:36 executing program 1: r0 = socket$inet(0x2, 0x80000, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0xebc1, 0x2080) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000140)=[{0xfffffffffffffffe, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x2ba, 0x200007fd, &(0x7f0000000080)={0x2, 0x4e24, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000040)={0x6, 0x8, 0x1746}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) connect(r2, &(0x7f0000000240)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x40, 0x1, 0x2}}, 0x80) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) fstat(r1, &(0x7f00000001c0)) 08:58:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x100, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x40, 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', 0x0, 0x0, 0x3) 08:58:36 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x2ae) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:36 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x3f00) 08:58:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0xffffff9e, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1268.165937] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000010,noquota,auto_da_alloc=0x0000000000000000, 08:58:37 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x4000) 08:58:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x11}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0xfffffff0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:37 executing program 0: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) ioctl$SIOCRSSL2CALL(r2, 0x89e2, &(0x7f0000000080)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) 08:58:37 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x4800) 08:58:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x3000000000000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:37 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$pptp(0x18, 0x1, 0x2) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 1268.557400] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000011,noquota,auto_da_alloc=0x0000000000000000, 08:58:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c, 0x800) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f00000002c0)=[0x6, 0x3]) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x120000000000000}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000240)={r3, 0x5, 0xffffffffffffffff, 0x6, 0x6}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', 0x0, 0x3, 0x2) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r4, 0x80045301, &(0x7f00000000c0)) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000300)={0x7, 0x61c, 0x1, 0x7}, 0x10) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000340)={0x0, r1, 0x4, 0x1, 0x7fff, 0x7}) 08:58:37 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x4c00) [ 1268.728265] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000011,noquota,auto_da_alloc=0x0000000000000000, 08:58:37 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xd76, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2a}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x40030000000000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:37 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x6800) 08:58:37 executing program 0: socketpair$unix(0x1, 0x6, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$vbi(&(0x7f00000002c0)='/dev/vbi#\x00', 0x2, 0x2) mknodat(r2, &(0x7f0000000300)='./file0\x00', 0x2, 0x4a) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$UHID_CREATE2(r0, &(0x7f0000000380)={0xb, 'syz1\x00', 'syz0\x00', 'syz1\x00', 0xe9, 0xe0f, 0x80, 0x2, 0x0, 0x6, "9541c102c39b80b4c3f956ed0691112a364c987f7dd4de5b030361ea86987a1b59128e54d442193270cc009b93ea1a4136e99ec76eddbaa1bf7204daf456172eb4cca14d41fce9b8ba06cd42d8d6b1b4d96edb729c886ad6f6ad8465c84d07de6c7c01397f070b049d62cb55d0534ad9331da0c514bdb4138f152f410c2efcd1657a3a8e97ba1d5c8c0bd34691991951ff85cb20bbcc161ad723bb8eacc2706b30392e0240107465fc59635f5b765cf5af04eb8b30720677244460ca896cb09c4a18e908c2c3a07cb995c4eb1d7f74c7ac134046a79d9df140cf46a481835bf29933e247722489f375"}, 0x201) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) r4 = accept4$rose(r3, &(0x7f0000000180)=@full={0xb, @remote, @null, 0x0, [@rose, @remote, @default, @default, @default, @default]}, &(0x7f0000000200)=0x40, 0x80800) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000240)={'bpq0\x00', {0x2, 0x4e21, @multicast2}}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x3}, &(0x7f00000000c0)=0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x2001, 0x0) ioctl$PIO_CMAP(r3, 0x4b71, &(0x7f0000000280)={0xaf51, 0x8, 0x3ff, 0x4a, 0x1, 0x61c}) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000100)={r5, 0x7}, &(0x7f0000000140)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x5) [ 1269.230382] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000002a,noquota,auto_da_alloc=0x0000000000000000, 08:58:38 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x6c00) 08:58:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x101, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.s\xe2\x84\xebb\xab\x8f\xaetat\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f00000000c0)=0x80) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0xf0ffffffffffff, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1269.352875] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000002a,noquota,auto_da_alloc=0x0000000000000000, 08:58:38 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7, 0x200002) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000140), &(0x7f0000000300)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) socket$inet6(0xa, 0xa, 0x101) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x0, 0xc0, [0x200001c0, 0x0, 0x0, 0x200001f0, 0x20000220], 0x0, &(0x7f0000000040), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x138) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 1269.526949] kauditd_printk_skb: 16 callbacks suppressed [ 1269.526962] audit: type=1804 audit(1546592318.279:171): pid=12028 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1576/bus" dev="sda1" ino=16689 res=1 08:58:38 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x7400) [ 1269.594971] audit: type=1804 audit(1546592318.279:172): pid=12028 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1576/bus" dev="sda1" ino=16689 res=1 08:58:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x100000000000000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:38 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2d}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 1269.755822] audit: type=1804 audit(1546592318.509:173): pid=12040 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1577/bus" dev="sda1" ino=16689 res=1 [ 1269.848120] audit: type=1804 audit(1546592318.509:174): pid=12040 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1577/bus" dev="sda1" ino=16689 res=1 [ 1269.962289] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000002d,noquota,auto_da_alloc=0x0000000000000000, 08:58:38 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0xffffffffffffffcc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r3, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r4, 0x0, 0xfffffffffffffe11) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:38 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8, 0x40000) ioctl$int_in(r0, 0x5421, &(0x7f00000000c0)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:38 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x7a00) 08:58:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x200000000000000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1270.049128] audit: type=1804 audit(1546592318.799:175): pid=12055 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1578/bus" dev="sda1" ino=16711 res=1 08:58:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:38 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0xff0f) 08:58:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x300000000000000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1270.113212] audit: type=1804 audit(1546592318.799:176): pid=12055 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1578/bus" dev="sda1" ino=16711 res=1 08:58:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3b}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 1270.229512] audit: type=1804 audit(1546592318.979:177): pid=12072 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1579/bus" dev="sda1" ino=16735 res=1 [ 1270.311767] audit: type=1804 audit(1546592319.009:178): pid=12072 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1579/bus" dev="sda1" ino=16735 res=1 [ 1270.468173] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000003b,noquota,auto_da_alloc=0x0000000000000000, 08:58:39 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000000140)='/dev/dsp#\x00', 0xffffffffffffffff}, 0x30) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffff9c, 0x50, &(0x7f0000000280)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r1, r2, 0x0, 0xa, &(0x7f0000000240)='/dev/dsp#\x00', r3}, 0x30) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r2, 0x408c5333, &(0x7f0000000380)={0x2, 0xffffffff, 0x7d, 'queue1\x00', 0x81}) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) ioctl$TIOCLINUX3(r2, 0x541c, &(0x7f0000000440)) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r5 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x6, 0x100) ioctl$KDGKBTYPE(r5, 0x4b33, &(0x7f0000000080)) 08:58:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x400000000000000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x8, 0x8, 0x2, 0x40, 0x2}, &(0x7f0000000140)=0x98) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000180)) ioctl$VIDIOC_G_CTRL(r2, 0xc008561b, &(0x7f00000002c0)={0x7f, 0x2}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000200)={r3, @in6={{0xa, 0x4e21, 0x2, @loopback, 0x2d}}, 0x4, 0x100, 0x7fff, 0x4, 0x10}, 0x98) 08:58:39 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x40000) 08:58:39 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)=0x0) r2 = getpgrp(r1) rt_sigqueueinfo(r2, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r5 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r5, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r5, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r5, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x48}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) [ 1270.643661] audit: type=1804 audit(1546592319.389:179): pid=12092 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1580/bus" dev="sda1" ino=16688 res=1 08:58:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) shmget(0x3, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmget$private(0x0, 0x4000, 0x80, &(0x7f0000ffc000/0x4000)=nil) shmget$private(0x0, 0x4000, 0x424, &(0x7f0000ffc000/0x4000)=nil) r2 = shmget(0x3, 0x400000, 0x0, &(0x7f0000c00000/0x400000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f0000000140)={0x3, &(0x7f0000000200)="8dd68cc17516a01204d4a683043de8ed426b1ab64e9d19c4599f4b36709a3594da68758d56f682fe8be9ac442ab643950080f24779c01bf7e335539a38e55f7f01245b1b9c0033f10a86d283914796eb456adf40f37037a591b5745744b74dee300e7ec589d39916c582cc1d77a16bcd1d71a58d0260603b909ccbb0e300a444b0de5bdc24ffaf52f6005cce69ad19a2f6e5c1ba4942452d95c4b37ba3a6"}) 08:58:39 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x1000000) [ 1270.779130] QAT: Invalid ioctl [ 1270.785078] audit: type=1804 audit(1546592319.429:180): pid=12092 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir858963166/syzkaller.duKLk8/1580/bus" dev="sda1" ino=16688 res=1 [ 1270.804691] QAT: Invalid ioctl 08:58:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x800000000000000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:39 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @multicast1}, 0xfffffffffffffff6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x200000000000020b, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x3, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x8400, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/prev\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) getsockname$inet(r1, &(0x7f0000000140)={0x2, 0x0, @loopback}, &(0x7f00000001c0)=0x10) 08:58:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x4c}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:39 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x2000000) 08:58:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0xa00000000000000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f0000000080)='./bus\x00', 0x100, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:40 executing program 1: r0 = socket$inet(0x2, 0x4000000000100000, 0x8) setsockopt$inet_tcp_int(r0, 0x6, 0x3f, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fchdir(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e000000000000000000380000000000000000210000000020000000000000000000000000000000000000000000000000000000000008000500000000000000000000000000dcd22cd830a0b2dfb284f65d996c39550c551257a02ed03c8eb492c34f90a8a59b7699e38d4d0be528b75034bd7d9f105005f64d649be114b2288c34fb7ddc637b9d0946f83fec2e839af8f9e12f1ee75adde08e55100ccc787198f570d1cf8416e898239ed43d19c4bb3eaa5c9495e9305721ff13922f38aac16073c8ed4717183c41e8c61b85998d2b22712b0a91c18ee6b34b2226963a252192add15f12e5e35fe1804cdcfc91b0c363e584a73a6cf78384a3d877d3b7e2dbd3a833e00e86566e1227eb76d72ed2187067f36e751a5e825bd6d2c1f8d92362c2534127745e11761d06bbbb21a3c6ba400a5bb944464faa2c7ba5b7ebd4a8f218a0c226794fed393e6352773cc194f3cb3c844071783f8474ae4e7563d03977aabf830ba9b9448aebba376c0a75dff27315e9ab8d25f92e6990056e0207fe4d451b62624a1be93d6951b9c42d96620e550e2c1e742df871954cfd2f88bc50993bd122e2ec48b9b9e4d0b58cc9aa7f3de2a604eaca277e5fee88b6071d1810e70821eba8e8ef5277ab7cbcafbb08f9ba7945329c68239c9e333d1e7cd237b0019163d705972a545ec743ce9ffe069caae5ce1f59bbdb59e6af1b8de06ee912618d7bea3ae603def7f99defee0f55dd287483e308bfa8d9f93b69b2f3b7e0916d4adb266df3240872fc4c9f5e8d86a95ad9a6373915cfbd6f1cc80ce2dd29dda28a539929a959fe736c0c41515562"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:58:40 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x3000000) 08:58:40 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e22, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x1a) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f00000000c0)={0x7, @vbi={0x7, 0x6, 0x9, 0x43564548, [0x7fa, 0x80], [0xfffffffffffffffa, 0x3], 0x3}}) 08:58:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x60}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:40 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x4000000) 08:58:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0xe00000000000000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:40 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x3, 0x2, 0xffff) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:58:40 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x5000000) 08:58:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0xf00000000000000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:40 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x6, 0x7fffffff) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x141080, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000900)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r3, 0x8991, &(0x7f0000000000)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f0000000500)={0x40000001, 0x4, [0xfff, 0x100, 0x3fd, 0x40, 0x4000020000, 0xfffffffffffffffb, 0x8, 0x5]}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f00000004c0)) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000380)="e2da5cdea423495c8b5663b2d9e462f4e65c25cc8b2ba5e1349cd9ae758d94c045f53f48860fd0b3d8013a69034f6ac0d6e1e98dfe38d2d9e2e2c54d473c67bfa22bbf07fadb6002cda4dd466bf8b4ac1fd7837039b702b9d0fa204a8e5df87c3de67d40844e3ddd3c120aee61b90f3b98210922d8d4271c6df39457ffa88a8a1c33837414408c58e56e3fc11ec40ec466928864d45fe30bbdca4189941c975bc6fe8fb0e6bf8e2a58131d1b5d088066c68b8a6ee0c4e1fea78983de57627ebf6f449a310f966c64391d936f99802fb9320ae1cc") r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/sequencer2\x00', 0x40042, 0x0) sendto$inet(r1, &(0x7f00000000c0)="8dec431bb44aff53a310b4eabef65b9ca28574570c8753d962784ce7563c1f448215fd237bf4c9159a98e9205a38a1fef116825d2a67dccc355557378e26b4e71c9ead8245ce8f8727e4d5e348d6b048462955248e97e362bb149adcd5ad849873b82111c2ecfa383140f9d4c99f525041a886277a6592dbc6b9108911e88a440b93f5c0fae544676b44a19bf06aa255a549db9cb0a9221a90f33fec43b1d074bf", 0xa1, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000580)='fou\x00') sendmsg$FOU_CMD_DEL(r4, &(0x7f0000000640)={&(0x7f00000006c0), 0xc, &(0x7f0000000600)={&(0x7f0000000940)=ANY=[@ANYBLOB="000028bd7000fddbdf2502000000080003003b000000080001014e2300005ea1fdf66813eb0f54b08372e0fbfb3272911bb09ddd03737ac87305d1c8471a0ee38202287756de750db8fbfc674ed8a0ba20c77fda71279da02745230b83c4c940f80bf72e3aee18afefc4044b006eb77048066c8a9c9ecd1b0dd195959e86e4e95fe2243d1720921a8b9d72d7d70b7c2dcfcf3f64fb8e9a21a5d00ac3d9220130dc323a25dc1296d1faaf3e4a8449693e376849574b2a69b0d63220b0859a620bb5fc8df3c665ebda05470c3b1dcd1f96381641c5796b5f2547937443dd"], 0x1}, 0x1, 0x0, 0x0, 0x20044000}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000ac0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f0000000b00)=ANY=[@ANYBLOB="524de2d0113d35fab251d3e1c92bc5a0463a232077eab1ae8d50faa6040b8b376a65970ddb19cbd99e254682073d27e534438e835ef99e41c4150d1406e7ed5a54c0d773ee0c19192a1e3662d6459477c422bc9bf3db54d9fa50705096c791e8891e3927789b3168779c76529b799ab8bf1585440eb9ad00009f39c439650afa4d7cbf7938cdd37043d1f0923313f6a2343a1de2456e143b260bdaf822560300000031b17129bac94ab715ff11adf2938c442eb9d7e5dc8cb24227acfc350043b16146f9125e064a58b3c41055a24cb01447415e716d54101447a45730a976200f27faca8c9a51145420baee2cc8ca2eb4c89e24a70b"], 0x1}, 0x1, 0x0, 0x0, 0x8050}, 0x40) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x200) r6 = dup2(r5, r4) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r6, 0x28, 0x6, &(0x7f0000000240)={0x0, 0x7530}, 0x10) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer\x00', 0x410, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = syz_open_dev$midi(&(0x7f0000000740)='/dev/midi#\x00', 0x0, 0x40100) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000300)={0x0, @remote, @loopback}, &(0x7f0000000340)=0xc) sendmsg$nl_route(r8, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000005c0)={&(0x7f0000000380)=@mpls_delroute={0x3c, 0x19, 0x0, 0x70bd2d, 0x25dfdbfe, {0x1c, 0xa0, 0x20, 0x10000, 0x0, 0x0, 0xfe, 0x6, 0x100}, [@RTA_DST={0x10, 0x1, [{0x80000000, 0x14, 0x9}, {0x6, 0x3, 0xcaa7, 0x6}, {0x2, 0x80, 0x2, 0xb82}]}, @RTA_OIF={0x8, 0x4, r9}, @RTA_DST={0x8, 0x1, [{0x0, 0x400000000000, 0x2, 0x3ff}]}]}, 0x3c}}, 0x4008000) ioctl$sock_proto_private(r7, 0x80089ec, &(0x7f0000000140)="039625617620978a4df541244054545eefb285b44d2198c37642636f3bd6084339c6e79154e7a4e1e8a3a316d5a4d756fa828508c3eaae4df2759d4d16de576413772f248c74aae160e44749d604a7af5290efc74ba837ec71ff4bfb5f9a2d51403ecc6b5a4bb2dab710e3367549b45cd0b3fed1c251372400872f340ee3b348964d022f3224519d06adad720a5650c9b04292955ae6fd364adebee641bc911bcdd907f409e8200d95b946789c69b1d8876c") getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r8, 0x84, 0x74, &(0x7f0000000280)=""/42, &(0x7f0000000700)=0x2a) syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0xff, 0x80000) syz_open_dev$sndtimer(&(0x7f0000000480)='/dev/snd/timer\x00', 0x0, 0x100000000000407e) setsockopt$inet_group_source_req(r7, 0x0, 0x2e, &(0x7f0000000000)={0x1, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) 08:58:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:40 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x6000000) 08:58:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x1000000000000000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1272.316851] EXT4-fs: 7 callbacks suppressed [ 1272.316871] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000068,noquota,auto_da_alloc=0x0000000000000000, [ 1272.343778] bond0: Releasing backup interface bond_slave_1 08:58:41 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x7000000) 08:58:41 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:41 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x8040000) [ 1272.460465] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000068,noquota,auto_da_alloc=0x0000000000000000, 08:58:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x6000000000000000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6c}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:41 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000200)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000240)={r1, @loopback, @remote}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:58:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) socket$bt_rfcomm(0x1f, 0x1, 0x3) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) 08:58:41 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0xa000000) 08:58:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x9effffff00000000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:41 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x20000000) [ 1272.944131] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000006c,noquota,auto_da_alloc=0x0000000000000000, 08:58:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x5, 0x8}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000100)={r2, 0x93, "2a8a1df4efe2d3296b625cc185fa25396284e56d3c82c121f7b5db2f16346ece1f9fd5a8f4e6b4805fe9c88213909c4e653de3a1f1b97c2a5234000a4b04f3feb6161e64dcd3fcd7e65e5ca85826a68701a479079f369b60878356505c14504f529e4981723d13178abe3839ea0805285a12909e4de510bcc294ee819797084050d796e587c2b780e2a53bbbcd19bba9394e66"}, &(0x7f0000000200)=0x9b) clone(0xc400, &(0x7f0000000240)="f6ed3b33dbc03b700b1b4b83d2e4afc456274a8d8f075190c1308d570ec012fe539a", &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="d7655c5e60dda6ed3b8a16e55304fe8fc66ca197393a5662684f29d96ee72987834b08847b54cb4b346f0f93747e28a41a43464b3ef536ce8b720950d471cfb776a4b8f3ff45406c9209a62cc9b799cd5bbb8e00a2d7123b64be814c0aa3f906e559c96f4f11e74f690fdd98b5b2840168720f9d73c15880a224ab87b024b89251e2f03969955712d51478") 08:58:41 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x3f000000) 08:58:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0xbc0e000000000000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1273.113902] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000006c,noquota,auto_da_alloc=0x0000000000000000, 08:58:42 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r0, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r1 = getpgrp(0x0) rt_sigqueueinfo(r1, 0x400024, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r0, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000001c0)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x10, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r4 = syz_open_dev$adsp(&(0x7f00000003c0)='/dev/adsp#\x00', 0x6, 0x80) ioctl$NBD_SET_BLKSIZE(r4, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r4, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@mcast1}, 0x20) 08:58:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x74}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0xf0ffffff00000000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:42 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x40000000) [ 1273.538821] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000074,noquota,auto_da_alloc=0x0000000000000000, [ 1273.659394] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000074,noquota,auto_da_alloc=0x0000000000000000, 08:58:42 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 08:58:42 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x48000000) 08:58:42 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0xc000, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f00000000c0)=""/206) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0xffffff7f00000000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x79}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:42 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x4c000000) 08:58:42 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x80, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000000c0)=0xc7ff, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0xfffffffffffff000, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) [ 1274.013989] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000079,noquota,auto_da_alloc=0x0000000000000000, [ 1274.016596] EXT4-fs error (device sda1): ext4_xattr_set_entry:1602: inode #16592: comm syz-executor3: corrupted xattr entries [ 1274.052674] EXT4-fs error (device sda1): ext4_xattr_set_entry:1602: inode #16609: comm syz-executor0: corrupted xattr entries [ 1274.071026] EXT4-fs error (device sda1): ext4_xattr_ibody_get:591: inode #16625: comm syz-executor4: corrupted in-inode xattr [ 1274.112990] EXT4-fs error (device sda1): ext4_xattr_set_entry:1602: inode #16609: comm syz-executor0: corrupted xattr entries [ 1274.158449] EXT4-fs error (device sda1): ext4_xattr_ibody_get:591: inode #16625: comm syz-executor4: corrupted in-inode xattr [ 1274.195011] EXT4-fs error (device sda1): ext4_xattr_set_entry:1602: inode #16592: comm syz-executor3: corrupted xattr entries [ 1274.197975] EXT4-fs error (device sda1): ext4_xattr_set_entry:1602: inode #16609: comm syz-executor0: corrupted xattr entries [ 1274.219827] EXT4-fs error (device sda1): ext4_xattr_ibody_get:591: inode #16625: comm syz-executor4: corrupted in-inode xattr [ 1274.234043] EXT4-fs error (device sda1): ext4_xattr_set_entry:1602: inode #16609: comm syz-executor0: corrupted xattr entries [ 1274.253114] EXT4-fs error (device sda1): ext4_xattr_set_entry:1602: inode #16592: comm syz-executor3: corrupted xattr entries [ 1274.320042] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000079,noquota,auto_da_alloc=0x0000000000000000, 08:58:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$nl_generic(0x10, 0x3, 0x10) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x40002, 0x0) connect$bt_l2cap(r1, &(0x7f00000000c0)={0x1f, 0x200, {0x3, 0x5fdb, 0x426, 0x4, 0x5, 0x4}, 0x2, 0x735}, 0xe) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 08:58:43 executing program 3: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x200, 0x68000000) 08:58:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {{0x2}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) 08:58:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40e0, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7a}}, {@noquota='noquota'}, {@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:58:43 executing program 1: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x1ea, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) fallocate(r1, 0x0, 0x0, 0x200) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/prcoc/sy/ipv4-vs/nat_icmp_send\xce&kl[K\x1f\x1d\x14\xaf\x1e\xbb\xbf\x80\xb1M7\xad\xfc\xe3\"\x8d&\xef\xc0\x16\xd8-\xf8\x10O/\a\xe7?:B\x02\x8b\x9b=me\x1c51\x94{#\xb3D\xe7]\x91\\m\x84\xc5%\xbcBlK\x05\x80\x9b\x1c\xb1IZ\x11\xd556\xf0T\xed\x04\xf3K\xc8&\xb6\xc2\xce\xe6\xc4\xfcsg\xc7B\xbb!\xa80!\x8a\x1f\xc1x\xc2\xfd2\x15l\xef\x18\xa0\x99\x82)HDF5\x03\xf3\x047\x03OYX!d\xceH\x7f\x1bG\x95\xd6', 0x2, 0x0) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x1f, 0x2) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x1) write$binfmt_elf32(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x260) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000000040)={0x2b, @empty, 0x4e23, 0x4, 'ovf\x00', 0x4, 0x4, 0x13}, 0x2c) 08:58:43 executing program 5: r0 = accept4$unix(0xffffffffffffffff, &(0x7f00000003c0)=@abs, &(0x7f0000000480)=0x6e, 0x800) ioctl$sock_FIOGETOWN(r0, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r1, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) r2 = getpgrp(0x0) rt_sigqueueinfo(r2, 0x400024, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r1, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc0321", 0x21, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='cpuacct.usage_user\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r5 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r5, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f00000002c0), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r1, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r5, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$PIO_FONTRESET(r5, 0x4b6d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000080)={@ipv4={[], [], @broadcast}, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x13) [ 1279.368970] EXT4-fs error: 12 callbacks suppressed [ 1279.368985] EXT4-fs error (device sda1): ext4_xattr_set_entry:1602: inode #16626: comm syz-fuzzer: corrupted xattr entries [ 1279.996525] EXT4-fs error (device sda1): ext4_xattr_set_entry:1602: inode #16626: comm syz-fuzzer: corrupted xattr entries [ 1280.016642] EXT4-fs error (device sda1): ext4_xattr_set_entry:1602: inode #16626: comm syz-fuzzer: corrupted xattr entries [ 1280.046222] EXT4-fs error (device sda1): ext4_xattr_set_entry:1602: inode #16626: comm syz-fuzzer: corrupted xattr entries [ 1280.088050] EXT4-fs error (device sda1): ext4_xattr_set_entry:1602: inode #16626: comm syz-fuzzer: corrupted xattr entries [ 1280.121315] EXT4-fs error (device sda1): ext4_xattr_set_entry:1602: inode #16626: comm syz-fuzzer: corrupted xattr entries [ 1280.369743] device bridge_slave_1 left promiscuous mode [ 1280.381805] bridge0: port 2(bridge_slave_1) entered disabled state [ 1280.428317] device bridge_slave_0 left promiscuous mode [ 1280.444009] bridge0: port 1(bridge_slave_0) entered disabled state [ 1280.979455] EXT4-fs error (device sda1): ext4_xattr_ibody_get:591: inode #16655: comm syz-fuzzer: corrupted in-inode xattr [ 1281.006080] EXT4-fs error (device sda1): ext4_xattr_ibody_get:591: inode #16655: comm syz-fuzzer: corrupted in-inode xattr [ 1281.025805] EXT4-fs error (device sda1): ext4_xattr_ibody_get:591: inode #16655: comm syz-fuzzer: corrupted in-inode xattr [ 1281.056145] EXT4-fs error (device sda1): ext4_xattr_ibody_get:591: inode #16655: comm syz-fuzzer: corrupted in-inode xattr [ 1281.117685] ================================================================== [ 1281.125495] BUG: KASAN: use-after-free in ext4_xattr_set_entry+0x22ad/0x3d20 [ 1281.132679] Read of size 4 at addr ffff8880769f3ffd by task syz-executor0/12326 [ 1281.140121] [ 1281.141753] CPU: 0 PID: 12326 Comm: syz-executor0 Not tainted 4.20.0+ #8 [ 1281.148597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1281.157939] Call Trace: [ 1281.160553] dump_stack+0x1db/0x2d0 [ 1281.164179] ? dump_stack_print_info.cold+0x20/0x20 [ 1281.169193] ? __lock_is_held+0xb6/0x140 [ 1281.173249] ? ext4_xattr_set_entry+0x22ad/0x3d20 [ 1281.178101] print_address_description.cold+0x7c/0x20d [ 1281.183408] ? ext4_xattr_set_entry+0x22ad/0x3d20 [ 1281.188266] ? ext4_xattr_set_entry+0x22ad/0x3d20 [ 1281.193117] kasan_report.cold+0x1b/0x40 [ 1281.197188] ? ext4_xattr_set_entry+0x22ad/0x3d20 [ 1281.202031] check_memory_region+0x123/0x190 [ 1281.206432] memmove+0x24/0x50 [ 1281.209618] ext4_xattr_set_entry+0x22ad/0x3d20 [ 1281.214284] ? __getblk_gfp+0xea/0xd20 [ 1281.218167] ? lock_downgrade+0x910/0x910 [ 1281.222315] ? kasan_check_read+0x11/0x20 [ 1281.226458] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1281.231748] ? ext4_xattr_inode_get+0x9c0/0x9c0 [ 1281.236438] ? __ext4_get_inode_loc+0x463/0x1340 [ 1281.241226] ? ___might_sleep+0x1e7/0x310 [ 1281.245394] ? arch_local_save_flags+0x50/0x50 [ 1281.249980] ? __might_sleep+0x95/0x190 [ 1281.253953] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1281.259501] ext4_xattr_ibody_set+0x80/0x2b0 [ 1281.263912] ext4_xattr_set_handle+0x983/0x17d0 [ 1281.268593] ? ext4_xattr_ibody_inline_set+0x2b0/0x2b0 [ 1281.273873] ? __kmalloc_track_caller+0x5d1/0x740 [ 1281.278720] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1281.284000] ? memcpy+0x46/0x50 [ 1281.287282] ? kstrdup+0x5a/0x70 [ 1281.290675] ext4_initxattrs+0xc0/0x130 [ 1281.294648] security_inode_init_security+0x32f/0x430 [ 1281.299845] ? ext4_init_acl+0x360/0x360 [ 1281.303904] ? unregister_lsm_notifier+0x30/0x30 [ 1281.308653] ? posix_acl_create+0x11a/0x430 [ 1281.312976] ? ext4_set_acl+0x5f0/0x5f0 [ 1281.316943] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1281.322494] ? check_preemption_disabled+0x48/0x290 [ 1281.327511] ext4_init_security+0x34/0x40 [ 1281.331657] __ext4_new_inode+0x4a47/0x6cb0 [ 1281.335987] ? ext4_free_inode+0x1a80/0x1a80 [ 1281.340433] ? unwind_get_return_address+0x61/0xa0 [ 1281.345378] ? __save_stack_trace+0x8a/0xf0 [ 1281.349717] ? smk_access+0x528/0x700 [ 1281.353516] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1281.359064] ? smack_log+0x436/0x5b0 [ 1281.362781] ? smk_access_entry+0x310/0x310 [ 1281.367104] ? kasan_slab_free+0xe/0x10 [ 1281.371090] ? kmem_cache_free+0x86/0x260 [ 1281.375263] ? filename_create+0x29d/0x5a0 [ 1281.379506] ? do_mkdirat+0xcf/0x2f0 [ 1281.383231] ? __x64_sys_mkdir+0x5c/0x80 [ 1281.387333] ? do_syscall_64+0x1a3/0x800 [ 1281.391413] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1281.396776] ? smk_tskacc+0x3d3/0x520 [ 1281.400605] ? print_usage_bug+0xd0/0xd0 [ 1281.404676] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1281.410207] ? __dquot_initialize+0x632/0xda0 [ 1281.414736] ? dquot_get_next_dqblk+0x180/0x180 [ 1281.419406] ? check_preemption_disabled+0x48/0x290 [ 1281.424424] ? smk_curacc+0x7f/0xa0 [ 1281.428073] ext4_mkdir+0x45a/0xef0 [ 1281.431736] ? ext4_init_dot_dotdot+0x520/0x520 [ 1281.436410] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1281.441949] ? security_inode_permission+0xd5/0x110 [ 1281.446963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1281.452500] ? security_inode_mkdir+0xee/0x120 [ 1281.457116] vfs_mkdir+0x433/0x690 [ 1281.460656] do_mkdirat+0x271/0x2f0 [ 1281.464296] ? __ia32_sys_mknod+0xb0/0xb0 [ 1281.468442] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1281.473803] ? trace_hardirqs_off_caller+0x300/0x300 [ 1281.478899] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1281.483650] __x64_sys_mkdir+0x5c/0x80 [ 1281.487545] do_syscall_64+0x1a3/0x800 [ 1281.491451] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1281.496387] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1281.501408] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1281.506266] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1281.511445] RIP: 0033:0x4572e7 [ 1281.514632] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 3d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1281.533525] RSP: 002b:00007ffd845dfbc8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1281.541226] RAX: ffffffffffffffda RBX: 000000000003a2f8 RCX: 00000000004572e7 [ 1281.548485] RDX: 0000000000000035 RSI: 00000000000001c0 RDI: 00007ffd845dfd80 [ 1281.555763] RBP: 0000000000000001 R08: 000000000000f8f8 R09: 0000000000033600 [ 1281.563024] R10: 0000000000000011 R11: 0000000000000246 R12: 00000000000000c2 [ 1281.570283] R13: 00007ffd845dfd80 R14: 8421084210842109 R15: 00007ffd845dfd8c [ 1281.577561] [ 1281.579179] The buggy address belongs to the page: [ 1281.584115] page:ffffea0001da7cc0 count:2 mapcount:0 mapping:ffff88809e078b18 index:0x432 [ 1281.592500] def_blk_aops [ 1281.592517] flags: 0x1fffc000000203a(referenced|dirty|lru|active|private) [ 1281.602188] raw: 01fffc000000203a ffffea0001e852c8 ffffea0001cb5608 ffff88809e078b18 [ 1281.610065] raw: 0000000000000432 ffff888096b38d20 00000002ffffffff ffff88808b326380 [ 1281.617954] page dumped because: kasan: bad access detected [ 1281.623648] page->mem_cgroup:ffff88808b326380 [ 1281.628125] [ 1281.629740] Memory state around the buggy address: [ 1281.634673] ffff8880769f3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1281.642021] ffff8880769f3f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1281.649375] >ffff8880769f4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 1281.656732] ^ [ 1281.660110] ffff8880769f4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 1281.667477] ffff8880769f4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 1281.674831] ================================================================== [ 1281.682176] Disabling lock debugging due to kernel taint [ 1281.714867] Kernel panic - not syncing: panic_on_warn set ... [ 1281.720776] CPU: 0 PID: 12326 Comm: syz-executor0 Tainted: G B 4.20.0+ #8 [ 1281.729003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1281.738341] Call Trace: [ 1281.740942] dump_stack+0x1db/0x2d0 [ 1281.744570] ? dump_stack_print_info.cold+0x20/0x20 [ 1281.749645] panic+0x2cb/0x589 [ 1281.752852] ? add_taint.cold+0x16/0x16 [ 1281.756829] ? ext4_xattr_set_entry+0x22ad/0x3d20 [ 1281.761685] ? preempt_schedule+0x4b/0x60 [ 1281.765866] ? ___preempt_schedule+0x16/0x18 [ 1281.770290] ? trace_hardirqs_on+0xb4/0x310 [ 1281.774621] ? ext4_xattr_set_entry+0x22ad/0x3d20 [ 1281.779479] end_report+0x47/0x4f [ 1281.782965] ? ext4_xattr_set_entry+0x22ad/0x3d20 [ 1281.787809] kasan_report.cold+0xe/0x40 [ 1281.791798] ? ext4_xattr_set_entry+0x22ad/0x3d20 [ 1281.796641] check_memory_region+0x123/0x190 [ 1281.801054] memmove+0x24/0x50 [ 1281.804253] ext4_xattr_set_entry+0x22ad/0x3d20 [ 1281.808922] ? __getblk_gfp+0xea/0xd20 [ 1281.812817] ? lock_downgrade+0x910/0x910 [ 1281.816959] ? kasan_check_read+0x11/0x20 [ 1281.821112] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1281.826398] ? ext4_xattr_inode_get+0x9c0/0x9c0 [ 1281.831075] ? __ext4_get_inode_loc+0x463/0x1340 [ 1281.835836] ? ___might_sleep+0x1e7/0x310 [ 1281.839980] ? arch_local_save_flags+0x50/0x50 [ 1281.844557] ? __might_sleep+0x95/0x190 [ 1281.848531] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1281.854068] ext4_xattr_ibody_set+0x80/0x2b0 [ 1281.858483] ext4_xattr_set_handle+0x983/0x17d0 [ 1281.863155] ? ext4_xattr_ibody_inline_set+0x2b0/0x2b0 [ 1281.868433] ? __kmalloc_track_caller+0x5d1/0x740 [ 1281.873269] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1281.878562] ? memcpy+0x46/0x50 [ 1281.881841] ? kstrdup+0x5a/0x70 [ 1281.885205] ext4_initxattrs+0xc0/0x130 [ 1281.889181] security_inode_init_security+0x32f/0x430 [ 1281.894374] ? ext4_init_acl+0x360/0x360 [ 1281.898437] ? unregister_lsm_notifier+0x30/0x30 [ 1281.903188] ? posix_acl_create+0x11a/0x430 [ 1281.907509] ? ext4_set_acl+0x5f0/0x5f0 [ 1281.911484] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1281.917023] ? check_preemption_disabled+0x48/0x290 [ 1281.922041] ext4_init_security+0x34/0x40 [ 1281.926190] __ext4_new_inode+0x4a47/0x6cb0 [ 1281.930523] ? ext4_free_inode+0x1a80/0x1a80 [ 1281.934930] ? unwind_get_return_address+0x61/0xa0 [ 1281.939857] ? __save_stack_trace+0x8a/0xf0 [ 1281.944184] ? smk_access+0x528/0x700 [ 1281.947982] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1281.953513] ? smack_log+0x436/0x5b0 [ 1281.957223] ? smk_access_entry+0x310/0x310 [ 1281.961539] ? kasan_slab_free+0xe/0x10 [ 1281.965509] ? kmem_cache_free+0x86/0x260 [ 1281.969683] ? filename_create+0x29d/0x5a0 [ 1281.973909] ? do_mkdirat+0xcf/0x2f0 [ 1281.977634] ? __x64_sys_mkdir+0x5c/0x80 [ 1281.981723] ? do_syscall_64+0x1a3/0x800 [ 1281.985811] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1281.991179] ? smk_tskacc+0x3d3/0x520 [ 1281.994979] ? print_usage_bug+0xd0/0xd0 [ 1281.999041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1282.004577] ? __dquot_initialize+0x632/0xda0 [ 1282.009110] ? dquot_get_next_dqblk+0x180/0x180 [ 1282.013783] ? check_preemption_disabled+0x48/0x290 [ 1282.018796] ? smk_curacc+0x7f/0xa0 [ 1282.022434] ext4_mkdir+0x45a/0xef0 [ 1282.026074] ? ext4_init_dot_dotdot+0x520/0x520 [ 1282.030755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1282.036304] ? security_inode_permission+0xd5/0x110 [ 1282.041314] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1282.046846] ? security_inode_mkdir+0xee/0x120 [ 1282.051430] vfs_mkdir+0x433/0x690 [ 1282.054968] do_mkdirat+0x271/0x2f0 [ 1282.058619] ? __ia32_sys_mknod+0xb0/0xb0 [ 1282.062766] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1282.068130] ? trace_hardirqs_off_caller+0x300/0x300 [ 1282.073231] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1282.077982] __x64_sys_mkdir+0x5c/0x80 [ 1282.081865] do_syscall_64+0x1a3/0x800 [ 1282.085746] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1282.090673] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1282.095690] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1282.100529] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1282.105708] RIP: 0033:0x4572e7 [ 1282.108899] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 3d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1282.127794] RSP: 002b:00007ffd845dfbc8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1282.135498] RAX: ffffffffffffffda RBX: 000000000003a2f8 RCX: 00000000004572e7 [ 1282.142764] RDX: 0000000000000035 RSI: 00000000000001c0 RDI: 00007ffd845dfd80 [ 1282.150025] RBP: 0000000000000001 R08: 000000000000f8f8 R09: 0000000000033600 [ 1282.157283] R10: 0000000000000011 R11: 0000000000000246 R12: 00000000000000c2 [ 1282.164546] R13: 00007ffd845dfd80 R14: 8421084210842109 R15: 00007ffd845dfd8c [ 1282.172821] Kernel Offset: disabled [ 1282.176444] Rebooting in 86400 seconds..